Future of Information and Communication Conference (FICC) 2025
28-29 April 2025
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 5 Issue 11, 2014.
Abstract: Cloud computing is delivery of services rather than a product and among different cloud deployment models, the public cloud provides improved scalability and cost reduction when compared to others. Security and privacy of data is one of the key factors in transitioning to cloud. Typically the cloud providers have a demilitarized zone protecting the data center along with a reverse proxy setup. The reverse proxy gateway acts as initial access point and provides additional capabilities like load balancing, caching, security monitoring capturing events, syslogs related to hosts residing in the cloud. The audit-trail logs captured by reverse proxy server comprise important information related to all the tenants. While the PKI infrastructure works in cloud scenario it becomes cumbersome from manageability point of view and they lack flexibility in providing controlled access to data. In this paper we evaluate risks associated with security and privacy of audit logs produced by reverse proxy server. We provide a two-phase approach for sharing the audit-logs with users allowing fine-grained access. In this paper we evaluate certain Identity-Based and Attribute-Based Encryption schemes and provide detailed analysis on performance.
Bhanu Prakash Gopularam and Nalini N, “Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes” International Journal of Advanced Computer Science and Applications(IJACSA), 5(11), 2014. http://dx.doi.org/10.14569/IJACSA.2014.051120
@article{Gopularam2014,
title = {Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2014.051120},
url = {http://dx.doi.org/10.14569/IJACSA.2014.051120},
year = {2014},
publisher = {The Science and Information Organization},
volume = {5},
number = {11},
author = {Bhanu Prakash Gopularam and Nalini N}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.