Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2014.050320
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 5 Issue 3, 2014.
Abstract: Considering the most often talked about security risks in cloud computing, like, security and compliance, viability, lack of transparency, reliability and performance issues. Bringing strong auditability in cloud services can reduce these risks to a great extent. Also, auditing, both internally and externally is generally required and sometimes unavoidable looking into the present day competition in the business arena. Auditing in web based and cloud based usage environments focuses mainly on cost of a service which determines the overall expenditure of the user organization. However, the expenditure can be controlled by a collaborative approach between the provider company and the user organization by constantly monitoring the end user access and usage of subscribed cloud services. Though, many cloud providers will claim of having a robust auditable feature, the generic verifiability with sustainable long term recording of usage logs do not exist at all. Certain access management models can be perfectly extended to maintain audit logs for long terms. However, maintaining long term logs certainly has storage implications, especially with larger organizations. The storage implications need to be studied.
Ajay Prasad and Prasun Chakrabarti, “Extending Access Management to maintain audit logs in cloud computing” International Journal of Advanced Computer Science and Applications(IJACSA), 5(3), 2014. http://dx.doi.org/10.14569/IJACSA.2014.050320