Log File Compression and its Security in Web Server

The log file of any association may include sensitive data which must be protected properly for suitable working of that organization. Maintaining security of such log records is one of the important tasks. Also, over a long period of time maintaining authenticity of such log data is very important. However, deploying such a system for security of log records is a big task for any company and also it needs additional cost. There are many techniques have been proposed so far to secure log records. This paper presents a brief survey of optimal approaches for securing log files for forensic analysis. These techniques are reviewed considering its pros and cons. General Terms Security, Compression

[1]  Kent E. Seamons,et al.  Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..

[2]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[3]  Mihir Bellare,et al.  Forward Integrity For Secure Audit Logs , 1997 .

[4]  Gene Tsudik,et al.  A new approach to secure logging , 2008, TOS.

[5]  Indrajit Ray,et al.  Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.

[6]  Ulrich Flegel Pseudonymizing Unix Log Files , 2002, InfraSec.