Log records usually hold sensitive information. It is essential to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it: Access must be restricted to those authorized to view the data.
3. Tamper Resistance A secure log should be tamper resistant in such a way that no valid entries can be introduced by anyone other than the creator. In addition once those entries are created, they cannot be manipulated without detection. No one can prevent an attacker, who has compromised the logging system from altering what that system will put in future log entries.
Log record should reflect the true history of the system rather than wrong information. Once the log record is stored in storage, it will not be edited or modified by the attackers.
5. Privacy: Log records should not be casually traceable or linkable to other sources during transmission and in storage.
V. PROPOSED SCHEME
1) Privacy Protection: User transmits and save their log to the cloud by encrypted. Both ensure the security of log data in …show more content…
So the data has to be encrypted first and then uploaded to the cloud for process. This Fully Homomorphic encryption algorithm helps to attain confidentiality because of the calculations done in encrypted form without knowing the original form. It is very important for the data safety of the cloud computing platform, because the data is invisible to the third party and can be processed by the cloud itself. This paper suggests the Fully homomorphic encryption mechanism for processing log data to propose a cloud computing data security scheme. This scheme ensures the transmission of log between cloud and the user safely. Even in cloud storage, their data is safe. At present, Fully homomorphic encryption scheme has high computation problem. Future work will be eliminated that