Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15725
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shekhar, R | - |
dc.contributor.author | Sridhar, T | - |
dc.date.accessioned | 2024-07-08T10:06:50Z | - |
dc.date.available | 2024-07-08T10:06:50Z | - |
dc.date.issued | 2018-01 | - |
dc.identifier.citation | Vol. 4, No. 1; pp. 6-11 | en_US |
dc.identifier.issn | 2454-9762 | - |
dc.identifier.issn | 2454-9762 | - |
dc.identifier.uri | https://www.ijarmate.com/index.php?option=com_login&task=download_volume_doc&fname=V4i1&foldertype=journal&id=867 | - |
dc.identifier.uri | https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15725 | - |
dc.description.abstract | Cloud security incorporate under its umbrella extremely broad arrangement of administration level assertions (SLA's), systems which are utilized to secure client information, applications and assets that are associated by means of cloud. Be that as it may, in any case the customers are incapacitated with next to no help and learning about what really happens to their information after they have pushed it on to the cloud. Information possession is critical issue, particularly while managing a gigantic measure of information. This permits cloud gives to make their own terms and conditions, which on occasion may appear to be self-assertive. We proposed a novel approach which will keep up logging and observing for helping cloud purchasers to distinguish any strange movement and resolve the issues as needs be. However, logging has a wide application as well, hence it relies upon the client how and what he logs and screens. To help the purchasers all cloud specialist co-ops keep up logs and produce a tremendous measure of data, quite a bit of which is excess, clumsily designed, yet there are shrouded pieces of information that can help the customer to comprehend that they are having, or all the more vitally, going to have an issue. Utilizing these logs the work makes a device which parses these logs and gives client the adept measure of data and enables them to comprehend their exercises and occupation conduct on cloud. It causes them to report any irregularity in the utilization of their cloud occupation and foundation adequately. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE) | en_US |
dc.subject | Cloud Computing | en_US |
dc.subject | Cloud Security | en_US |
dc.subject | Openstack | en_US |
dc.subject | Server Node Log | en_US |
dc.subject | Logging And Monitoring | en_US |
dc.title | Retreat In Distributed Computing Utilization Of Action Log For Client Statistics Assurance | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
document_2_dz3q_30122017.pdf | 634.12 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.