Secure Audit Logging Scheme For Distributed Environment
Authors: Rahul Kaul, Er. Shraddha Kumar
Certificate: View Certificate
Abstract
Abstract- Audit logs, given that information about the existing and past states of systems, are one of the nearly all significant parts of current computer systems provided that protection for audit logs on an untrusted machine in a huge distributed system is a difficult task, particularly in the occurrence of active adversaries. In such a system, it is decisive to have ahead protection such that when an opposition compromise a machine, she cannot adjust or build the log entry accumulate previous to the conciliation. We propose a narrative forward secure and collective logging scheme call sightless collective ahead logging scheme, which is appropriate for huge distributed systems. Sightless collective ahead can create widely verifiable ahead secure and collective signatures with near-zero computational, storage, and communication costs for the loggers, without require any online trusted third party support. Keywords – Sightless collective ahead, Secure Audit Logging Scheme, Distributed Environment.
Introduction
The quickly increasing number of national and international observance necessities emphasize the significance of archiving of commerce processes communication, where proceedings are analyze as component of an audit to support or disprove likely violations of observance rules [1]. To this end, reliable records are necessary to assurance reliable responsibility and no repudiation of actions [2].We propose a novel ahead secure and collective logging scheme call sightless collective ahead classification technique, which is appropriate for huge distributed systems. Sightless collective ahead can create widely demonstrable ahead secure and collective signatures with near-zero computational, communication costs and storage, for the loggers; devoid of require any online trust third festivity support. To establish that sightless collective ahead is secure under suitable computational assumption, and exhibit that considerably more efficient and scalable than the earlier schemes.
Conclusion
We study the addition of sightless collective ahead in distributed systems .We would comparable to examine and categorize system level apprehension in use in secluded audit classification on entrust platforms. In this research present a narrative technique to automated audits support on the pruning of log data structured as trees in form of credentials. The audit consists in remove the nodes that are acquiescent with the policy, so that the residual tree encompasses the violation of the policy. As well present the technique. However, this is presently the primary step in investigating proficient audit algorithms and a number of interesting issue stay put to be examined. These issue are together of theoretical and practical nature.
Copyright
Copyright © 2025 Rahul Kaul, Er. Shraddha Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.