Academic Journals Database
Disseminating quality controlled scientific knowledge

Encrypted IT Auditing and Log Management on Cloud Computing

Author(s): Rajiv R Bhandari | Nitin Mishra

Journal: International Journal of Computer Science Issues
ISSN 1694-0784

Volume: 8;
Issue: 5;
Start page: 302;
Date: 2011;
Original page

Keywords: Customer Relationship Management | Enterprises Resource Planning | IJCSI

In this paper we are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, we are implementing working of IT auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this paper our main concern is to present the cloud computing implications for large enterprise applications like CRM/ERP and achieving the desired level of security with design and implementation of IT auditing technique. As results from practical investigation of IT auditing over the cloud computing framework, we claim that IT auditing assuring the desired level of security, regulations, compliance for the enterprise applications like CRM and ERP. Another problem in cloud computing is that huge amount of logs make the system administarator hard to analyse them.In this paper we proposed the method that enables cloud computing system to achive both effectiveness of system resource and strength of security service without trade-off between them.
Save time & money - Smart Internet Solutions     

Tango Jona
Tangokurs Rapperswil-Jona