Wednesday, 30 April 2014

A Log-based Approach to Make Digital Forensics Easier on Cloud Computing






















  1. User Registration
  2. Admin Login
  3. Account Blocking
  4. Account Renewal
  5. TTP (TRUSTED THIRD PARTY) LOGIN
  6. CSP(CLOUD SERVICE PROVIDER) LOGIN
  7. LOG FILES














System Configuration:-

H/W System Configuration:-


        Processor               -    Pentium –III






 

 S/W System Configuration:-





                                              Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system.









www.ieeeprojectcentre.in

No comments:

Post a Comment