[vc_row][vc_column][vc_column_text]

Main Reference PaperTowards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service, IEEE Transactions on Dependable and Secure Computing, April 2016 [Java].

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1456723760841{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #eeeeee !important;border-left-color: #467db1 !important;border-left-style: solid !important;border-right-color: #467db1 !important;border-right-style: solid !important;border-top-color: #467db1 !important;border-top-style: solid !important;border-bottom-color: #467db1 !important;border-bottom-style: solid !important;}” el_class=”project_short_document_div”][vc_empty_space height=”0px”][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Research Area of the Project” tab_id=”1456231495772-0-1f030-5b4d”][vc_column_text]

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Description” tab_id=”c2f36d6a-352e-6f030-5b4d”][vc_column_text]
  • A secure scheme is proposed that enables forensic investigation along with the assurance of confidentiality and integrity of the users’ logs through the scheme known as Proof of Past Log (PPL).Bloom filter based scheme is proposed to ensure better performance and security.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Aim & Objectives” tab_id=”1456230849764-0-4f030-5b4d”][vc_column_text]
  • To ensure the confidentiality and integrity while revealing the cloud user’s log for forensics investigation.

  • To provide better performance and security.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Contribution” tab_id=”1456230822819-0-7f030-5b4d”][vc_column_text]

  • A technique is contributed that achieves effective authentication of the external entity for accessing the log.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Software Tools & Technologies” tab_id=”1456231644788-0-6f030-5b4d”][vc_column_text]
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Project Recommended For” tab_id=”1456231810927-0-6f030-5b4d”][vc_column_text]
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Order To Delivery ” tab_id=”1456477045723-0-9f030-5b4d”][vc_column_text]
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

[/vc_column_text][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Previous Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563769754373{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Faccess-control-for-cloud-computing-through-secure-otp-logging-as-services|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Network Security Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563772831490{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fproject-titles-in-network-security-and-cryptography|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Next Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563769771695{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fdynamic-hash-table-based-public-auditing-for-secure-cloud-storage|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][/vc_row_inner][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Go To” tab_id=”1469878537167-0-2″][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”WSN Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563432400530{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wireless-sensor-networks|title:WSN%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”MANET Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563525661549{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-mobile-ad-hoc-networks|title:MANET%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Wired Network Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563360785730{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wired-networks|title:Wired%20Network%20Project%20List|”][/vc_column_inner][/vc_row_inner][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Project Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fproject-enquiry|title:Project%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#eeeeee” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1460363650504{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-enquiry|title:PhD%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1456728243100{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Guidance” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-guidance|title:Ph.D%20Guidance|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1563275074524{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][/vc_row_inner][vc_empty_space height=”20px”][vc_column_text]

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

[/vc_column_text][/vc_column][/vc_row]