Call For Paper Volume:4 Issue:7 Jul'2017 |

A SECURE AND TRUSTWORTHY RESOURCE SHARING IN SOCIAL NETWORK AND CLOUD COMPUTING

Publication Date : 07/04/2015



Author(s) :

Mr. Donbyntalang Dewkhaid , Dr.S.Uma , Mr.P. Samuel Kirubakaran , Mr. Prabhu Kavin.


Volume/Issue :
Volume 2
,
Issue 4
(04 - 2015)



Abstract :

Most of the business run today are online and security is of primary concern. But the online application are prone to security threats. Though security is available, for certain application. The security level is not satisfactory, and need was felt for providing a secure login service on data items like  picture. The main goal of the log manager is to provide high bandwidth and low level inactivity. In many real world application secure and sensitive information must be kept in log files on an untreated machine. Hence a log manager is designed and implemented in this project to provide solution for the security issues involved in log management.                 In the event of attack, this secure data will be prone to attack. But the log manager designed in this project is very secure and the attacker will not gain any information about the secure data from log files and also protects from corrupting the log files.                The following three steps are used by the attackers to hack: First the attacker can intercept any message sent over the internet. Second, the attacker can synthesize, replicate and replay data items in his possession. Finally, the attacker can be legitimate participant of the network or can try to impersonate legitimate hosts. Hence a log monitor is implemented for storing log files securely so that a secure read, write, delete , upload and download of the files is done. 


No. of Downloads :

21


Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

A SECURE AND TRUSTWORTHY RESOURCE SHARING IN SOCIAL NETWORK AND CLOUD COMPUTING

April 5, 2015