Enhancing Audit using Trace Logs Encrypted through User Secret Key Encryption Protocol in Multi Cloud Storage Management Application

Main Authors: Abirami V, Mohana A, Sarumathi V, Auxilia Osvin Nancy V
Format: Article Journal
Bahasa: eng
Terbitan: , 2020
Subjects:
Online Access: https://zenodo.org/record/3719248
Daftar Isi:
  • Cloud computing is a technology for sharing the resources for on demand request and for processing the data. V Various cloud storage providers (CSP) offers free and premium cloud storage spaces. Multi cloud storage management application provides a single unified interface to access all the connected storage spaces to obtain quick accessibility removing the effort and time involved in switching between CSPs to access data hosted in different CSPs. Authenticated accessibility ensures a secured environment but provision to audit the actions performed to verify the history of actions is required for auditing to ensure the data and application integrity. Observing and registering a Trace Log for each and every actions performed by each user will facilitate and assure the process of auditing. In order to secure the Trace Logs of each user from unauthorized access of other users, encryption can be employed using user specific secret key. This approach will ensure both security and authorization for the Trace Logs.