Sinu P S et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.2, February- 2014, pg. 15-20 © 2014, IJCSMC All Rights Reserved 15 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 3, Issue. 2, February 2014, pg.15 – 20 SURVEY ARTICLE A Survey on Delegating Log Management to The Cloud Sinu P S 1 , M.Ananthi 2 1 PG Scholar, Info Institute of Engineering, India 2 Associate Professor, Department of CSE, Info Institute of Engineering, India sinu.sreyas@gmail.com mail2ananthiinfo@gmail.com AbstractA log is a collection of record of the events that occurs within an organization containing systems and networks. Logs are being composed of entries which are of its own syntax; each log entry has information that are related to a specific event which has been occurred inside a system or network. Actually, logs are used basically for problems like troubleshooting, but at present logs serve many functions almost in all organizations, for optimizing performance of the system and network, for recording all the actions of users, and for providing useful data for malicious activity investigation. Logs have been in use for containing information that are related to various forms of events that are occurring in the networks and systems. Inside an organization, there are much logs which do contain records that are related to the security of the system; some common examples of these computer security logs are logs that are related to audit that contains the track of user authentication attempts and logs of security device that record the possible types of attacks. In this paper, we focus on the challenges for a secure cloud-based log management service and do propose a framework for doing the above. Keywords— Cloud computing; logging; privacy; security I. INTRODUCTION There are a number of approaches have been proposed for logging information in computing systems. Among these most of the approaches are based on syslog based environment which is the standard for network based logging protocol. The protocol used by syslog is UDP for transferring log information to the log server. Therefore there is no reliable delivery of log messages. The major disadvantage of syslog is it does not protect log records during transmit or at the point-point transfer. Syslog-ng is the replacement for backward compatible with syslog. Some of the features include supporting IPv6 protocol, capability to transfer log messages with reliability using TCP, and filtering the content of logs using regular expressions. Syslog-ng describes encryption of log record using SSL while transmission such that it protects the data from confidentiality and integrity precluding while in transmit. However, syslog-ng does not protect against log data modifications when it is placed at an end- point. The next concept is Syslog-sign which is an enhanced form of syslog that adds origin of authentication, message integrity, replay resistance, message sequencing, and detection of missing messages by using two additional messages— “signature blocks” and “certificate blocks.” Unfortunately, if signature blocks are associated with the log records they get deleted after authentication, which tamper the evidence and forward integrity is only partially fulfilled. Syslog-sign also do not provide any confidentiality or privacy during the transmission of data or at the end-end transmission. Another concept of syslog is Syslog-pseudo which is also an enhancement of syslog that proposes a logging architecture for pseudonymizing log files. The main idea behind this is that the log records are first processed by the pseudonymizer before being archived. The