Log Management

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 28488 Experts worldwide ranked by ideXlab platform

Mariappan Rajaram - One of the best experts on this subject based on the ideXlab platform.

  • Secure Logging as a Service—Delegating Log Management to the Cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

  • secure Logging as a service delegating Log Management to the cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

Kirill Belyaev - One of the best experts on this subject based on the ideXlab platform.

  • Secure Logging as a Service—Delegating Log Management to the Cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

  • secure Logging as a service delegating Log Management to the cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

Mikhail Strizhov - One of the best experts on this subject based on the ideXlab platform.

  • Secure Logging as a Service—Delegating Log Management to the Cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

  • secure Logging as a service delegating Log Management to the cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

Dieudonne Mulamba - One of the best experts on this subject based on the ideXlab platform.

  • Secure Logging as a Service—Delegating Log Management to the Cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

  • secure Logging as a service delegating Log Management to the cloud
    IEEE Systems Journal, 2013
    Co-Authors: Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram
    Abstract:

    Securely maintaining Log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the Log files and that of the Logging process need to be ensured at all times. In addition, as Log files often contain sensitive information, confidentiality and privacy of Log records are equally important. However, deploying a secure Logging infrastructure involves substantial capital expenses that many organizations may find overwhelming. Delegating Log Management to the cloud appears to be a viable cost saving measure. In this paper, we identify the challenges for a secure cloud-based Log Management service and propose a framework for doing the same.

Akihisa Kodate - One of the best experts on this subject based on the ideXlab platform.

  • A privacy-enhanced access Log Management mechanism in SSO systems from nominative signatures
    International Journal of Applied Cryptography, 2017
    Co-Authors: Sanami Nakagawa, Takashi Nishide, Keita Emura, Goichiro Hanaoka, Eiji Okamoto, Yusuke Sakai, Akihisa Kodate
    Abstract:

    In online services, a service provider (SP) manages access Logs containing customers' buying histories. Therefore, user's information is revealed from the exposed Logs if each customer can be linked. In fact, such information exposure has occurred due to the popularisation of online services. To cope with this problem, SPs may only have to delete access Logs, but then no illegitimate users will be traced from the Logs. In this paper, we propose a Log Management mechanism of solving problems. Specifically, we consider single sign on (SSO) systems, since plural access Logs might be connected by one account. We construct our privacy-enhanced access Log Management mechanism based on the Wang-Wang-Susilo SSO system (TrustCom, 2013) which applies the Schuldt-Hanaoka nominative signature scheme (ACNS, 2011). Finally, we estimte the efficiency of the proposed system, computation time is at most just over 80 milliseconds on a PC, which seems sufficiently practical.

  • TrustCom - A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures
    2014 IEEE 13th International Conference on Trust Security and Privacy in Computing and Communications, 2014
    Co-Authors: Sanami Nakagawa, Takashi Nishide, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Eiji Okamoto, Yusuke Sakai
    Abstract:

    In online services, e.g., Online shopping, a service provider (SP) manages access Logs containing customers' buying histories. Therefore, user's personal information, e.g., Their hobbies and diversions, is revealed from the exposed Logs if each customer can be linked. In fact, such information exposure has occurred due to the popularization of online services. To cope with this problem, SPs may only have to delete access Logs, but then no illegitimate users, who accessed the server illegally, will be traced from the Logs. In this paper, we propose a Log Management mechanism where (1) no user information is revealed even if Logs are exposed, but (2) illegitimate users can be traced when necessary. Specifically, we consider single sign on (SSO) systems, since plural access Logs might be connected by one account, and this could trigger the above privacy infringement problem. We construct our privacy-enhanced access Log Management mechanism based on the Wang-Wang-Susilo SSO system (TrustCom 2013) which applies nominative signatures as its building block. Specifically, we realize the system by additionally applying the invisibility property of the Schuldt-Hanaoka nominative signature scheme (ACNS 2011). Finally, we estimate the efficiency of the proposed system by using Pairing-Based Cryptography (PBC) library and confirmed that for each algorithm, computation time is at most just over 80 milliseconds on a PC, which seems sufficiently practical.