Encrypted IT Auditing and Log Management on Cloud Computing
In this paper, the authors are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, they are implementing working of IT auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this paper their main concern is to present the cloud computing implications for large enterprise applications like CRM/ERP and achieving the desired level of security with design and implementation of IT auditing technique.