Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Handling of Cloud Computing Audit Logs using Data Mining Techniques


Affiliations
1 Department of PG & Research in Computer Science, Dr.N.G.P Arts and Science College, Coimbatore, India
     

   Subscribe/Renew Journal


Cloud computing has now extended as a new paradigm for delivering services over the Internet. It is attractive to business owners, since it reduces the upfront investments. However, despite the fact that cloud computing offers potential opportunities to the IT industry, it has many issues and challenges still to be addressed. Eventually the business owners could not seek the physical location of their application or data, which reduces the confidentiality on cloud computing. Audit logs are used as one of the possible ways to secure the data and it allows forensic analysis when any security incidents that occurs. This paper present the data mining techniques used in audit logs.


Keywords

Cloud Computing, Data Mining, Audit Logs.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 236

PDF Views: 5




  • Handling of Cloud Computing Audit Logs using Data Mining Techniques

Abstract Views: 236  |  PDF Views: 5

Authors

S. Revathi
Department of PG & Research in Computer Science, Dr.N.G.P Arts and Science College, Coimbatore, India

Abstract


Cloud computing has now extended as a new paradigm for delivering services over the Internet. It is attractive to business owners, since it reduces the upfront investments. However, despite the fact that cloud computing offers potential opportunities to the IT industry, it has many issues and challenges still to be addressed. Eventually the business owners could not seek the physical location of their application or data, which reduces the confidentiality on cloud computing. Audit logs are used as one of the possible ways to secure the data and it allows forensic analysis when any security incidents that occurs. This paper present the data mining techniques used in audit logs.


Keywords


Cloud Computing, Data Mining, Audit Logs.