This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2017-001029, filed on Jan. 6, 2017, the entire contents of which are incorporated herein by reference.
The embodiment discussed herein is related to a log output apparatus and a log output method.
In recent years, together with performance improvement of physical machines, research of a virtualization technology for aggregating a plurality of virtual machines into one physical machine is underway. According to this virtualization technology, for example, virtualization software (hereinafter referred to also as hypervisor) allocates physical resources of a physical machine to a plurality of virtual machines to make it possible to provide a service by the software installed in each virtual machine.
In recent years, lending of a virtual machine to a business operator who performs provision and so forth of a service utilizing a virtual machine (such business operator is hereinafter referred to as service business operator) is performed by a business operator who provides a utilization environment of a virtual machine such as a resource, or an infrastructure of a physical machine (such business operator is hereinafter referred to also as cloud business operator). For example, a cloud business operator carries out lending of a virtual machine to a service business operator, for example, based on conditions set in a contrast.
Such a cloud business operator as described above accumulates a log outputted upon utilization of a virtual machine by a service business operator (such log is hereinafter referred to also as log information) into a storage device. Then, for example, if the cloud business operator accepts an inquiry about an event or the like occurring in a virtual machine from a service business operator, the cloud business operator extracts a desired log from among logs accumulated in the storage device and conducts an investigation for the accepted inquiry (for example, refer to Japanese Laid-open Patent Publication No. 2012-190345, Japanese Laid-open Patent Publication No. 2011-237975, Japanese Laid-open Patent Publication No. 2010-9223 and Japanese Laid-open Patent Publication No. 2014-235568).
According to an aspect of the embodiment, a log output apparatus includes, a memory and a processor coupled to the memory and the processor configured to, specify an occurrence time when an incident has been occurred, specify, from among a plurality of logs included in log information of software, a first log acquired within a first period according to the occurrence time and a second log acquired within a second period other than the first period in accordance with the log information stored in the memory, and output new log information in which character information included in the first logs is converted into first character information having confidentiality higher than confidentiality of the character information and besides character information included in the second logs is converted into second character information having confidentiality higher than confidentiality of the first character information.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
When such a cloud business operator as described hereinabove performs accumulation of logs into a storage device, the cloud business operator sometimes accumulates logs outputted from a virtual machine lent to different service business operators without distinguishing the logs from each other. Therefore, a person in charge of the cloud business operator who conducts an investigation for an inquiry (such person is hereinafter referred to also as person in charge of support) sometimes fails to perform extraction only of logs relating to a service business operator from whom the inquiry is received. Accordingly, when the person in charge of support conducts an investigation for the inquiry, for example, the person will extract logs including logs relating to other service business operators (logs that are not used in the investigation) and conduct an investigation for the inquiry.
However, there is the possibility that the logs accumulated in the storage device may include personal information or the like of persons who utilize a service provided by the service business operator (such person is hereinafter referred to also as user). Therefore, the cloud business operator preferably reduces opportunities for the person in charge of support to view logs relating to other service business operators as far as possible.
In contrast, the cloud business operator performs concealment of information included in the extracted logs, for example, before the person in charge of support performs viewing of the logs. Consequently, the cloud business operator may suppress the person in charge of support from viewing logs relating to a different service business operator.
However, in this case, there is the possibility that concealment may be performed also for logs to be used for an investigation for an enquiry (logs relating to the service business operator from which the inquiry is received) from among the logs extracted from the storage device. Therefore, the person in charge of support sometimes fails to conduct a sufficient investigation for the inquiry.
[Configuration of Information Processing System]
First, a configuration of an information processing system 10 is described.
The physical machine 2 is configured from one or more physical machines. Each of the physical machines includes, for example, a central processing unit (CPU), a memory (dynamic random access memory: DRAM), a hard disk (hard disk drive: HDD) and so forth. The physical resources of the physical machine 2 are allocated to a plurality of virtual machines 3 (in the example depicted in
Each virtual machine 3 renders, for example, a business system (not depicted) for allowing a service business operator to provide a service to users operative. Then, each virtual machine 3 accumulates a log generated upon operation of the business system as log information 231 into the storage device 2a.
The operation terminal 4 is a terminal for inputting, for example, when a user makes an inquiry about a service to a person in charge of support, the substance of the inquiry (hereinafter referred to also as incident) accepted by the person in charge of support ((1) in
Further, for example, when an input of the substance of an incident is received from the operation terminal 4, the information processing apparatus 1 forms incident information 131 from the substance of the inputted incident ((2) of
Further, for example, if an input that an investigation of an incident is to be conducted is received from the person in charge of support through the operation terminal 4, the information processing apparatus 1 acquires the incident information 131 corresponding to the incident of an investigation target from the storage device 1a ((4) of
Here, when such a cloud business operator as described above performs accumulation of logs into the storage device 2a, logs outputted from virtual machines lent out to different service business operators are sometimes accumulated collectively. In this case, in the logs accumulated in the storage device 2a, logs outputted from the virtual machines 3 utilized individually by a plurality of service business operators are included without being sorted. Therefore, the person in charge of support sometimes fails to perform extraction only of logs relating to the service business operator from which an inquiry has been received. Accordingly, when the service business operator conducts an investigation for an inquiry, it is significant for the service business operator to conduct an investigation while viewing logs including logs that relate to other service business operators (logs that are not used in the investigation).
However, there is the possibility that the logs accumulated in the storage device 2a may include personal information of users and so forth. Therefore, the cloud business operator preferably minimizes opportunities of the person in charge of support in viewing of logs related to other service business operators.
Therefore, the cloud business operator performs concealment of information included in the extracted logs, for example, before the person in charge of support views the logs. Consequently, the cloud business operator may suppress viewing of the logs related to the other service business operators by the person in charge of support.
However, in this case, there is the possibility that concealment may be performed also for logs to be used in an investigation for an inquiry (logs relating to the service business operator from which the inquiry has been received) from among the logs extracted from the storage device 2a. Therefore, the person in charge of support sometimes fails to perform sufficient investigation for the inquiry.
Therefore, the information processing apparatus 1 in the present embodiment specifies a generation time point of each of incidents whose information is included in the incident information 131. Then, the information processing apparatus 1 refers to the storage device 2a in which the log information 231 of software is stored to specify, from among a plurality of logs included in the log information 231, logs acquired within a period according to the specified generation time point (such logs are hereafter referred to also as first logs). Further, the information processing apparatus 1 refers to the storage device 2a in which the log information 231 of software is stored to specify, from among the plurality of logs included in the log information 231, logs acquired within any other period than the period according to the specified generation time point (such logs are hereinafter referred to also as second logs).
Thereafter, the information processing apparatus 1 converts character information included in the first logs into character information having higher confidentiality than confidentiality of the character information (character information having higher confidentiality is hereinafter referred to also as first character information) and converts character information included in the second logs into character information having higher confidentiality than confidentiality of the first character information (character information having higher confidentiality is hereinafter referred to also as second character information). Then, the information processing apparatus 1 outputs new log information (also called log information 231a) obtained by converting the character information included in the first logs and the second logs.
For example, the possibility that a log used in an investigation of an incident of an investigation target may have been acquired (stored) at a time point close to a generation time point of the incident of the investigation target is high. Therefore, the information processing apparatus 1 performs concealment of logs included in the log information 231 such that the confidentiality of any log acquired at a time point close to a generation time point of an incident of an investigation target becomes lower than the confidentiality of any other log.
This makes it possible for the information processing apparatus 1 to make the confidentiality of a log, which has high possibility in use in the investigation, relatively low and make the confidentiality of a log, which has low possibility in use in the investigation, relatively high. Therefore, the information processing apparatus 1 may maintain the confidentiality of logs that are not used in an investigation by the person in charge of support without obstructing the investigation by the person in charge of support.
[Hardware Configuration of Information Processing Apparatus]
Now, a hardware configuration of the information processing apparatus 1 is described.
The information processing apparatus 1 includes a CPU 101 that is a processor, a memory 102, an external interface (input/output (I/O) unit) 103 and a recording medium 104. The components mentioned are coupled to each other through a bus 105.
The recording medium 104 stores, for example, in a program storage region (not depicted) thereof, a program 110 for performing a process for outputting a concealed log (hereinafter referred to also as log outputting process). Further, the storage memory 104 includes an information storage region 130 (hereinafter referred to also as storage unit 130) for storing information to be used, for example, when a log outputting process is performed. It is to be noted that the information storage region 130 corresponds to the storage device 1a depicted in
The CPU 101 loads, upon execution of the program 110, the program 110 from the recording medium 104 into the memory 102 and cooperates with the program 110 to perform a log outputting process. Further, the external interface 103 performs communication, for example, with the operation terminal 4.
[Functions of Information Processing Apparatus]
Now, functions of the information processing apparatus 1 are described.
The CPU 101 of the information processing apparatus 1 cooperates with the program 110 to operate, for example, as an incident formation unit 111, an information management unit 112, a generation time point specification unit 113, a log specification unit 114, a character information conversion unit 115 and a log outputting unit 116. Then, into the information storage region 130, for example, incident information 131, utilization information 132 and authentication information 133 are stored.
The incident formation unit 111 forms incident information 131 from the substance of an inquiry (incident) inputted, for example, from the operation terminal 4. Then, the information management unit 112 stores the incident information 131 formed by the incident formation unit 111 into the information storage region 130.
The generation time point specification unit 113 specifies a generation time point of an incident of an investigation target. For example, the generation time point specification unit 113 specifies a generation time point included in the incident information 131 including information relating to the incident of the investigation target from within the incident information 131 stored in the information storage region 130.
The log specification unit 114 refers to the storage device 2a to specify first logs acquired within a period according to the generation time point specified by the generation time point specification unit 113 from among the plurality of logs included in the log information 231. The period according to the generation time point is, for example, a period from a time point prior by a given time period to the generation time point specified by the generation time point specification unit 113 (for example, priory by 10 minutes) to a time point later by a given time period than the generation time point specified by the generation time point specification unit 113 (for example, later by 10 minutes). Further, the log specification unit 114 refers to the storage device 2a to specify second logs acquired with any period other than the period according to the generation time point specified by the generation time point specification unit 113 from among the plurality of logs included in the log information 231.
The character information conversion unit 115 converts character information included in the first logs specified by the log specification unit 114 into first character information having higher confidentiality than confidentiality of the character information. Further, the character information conversion unit 115 converts character information included in the second logs specified by the log specification unit 114 into second character information having higher confidentiality than confidentiality of the first character information.
The log outputting unit 116 outputs log information 231a obtained by the conversion of the character information included in the first logs and the second logs. The utilization information 132 and the authentication information 133 are hereinafter described.
Now, an outline of a first embodiment is described.
As depicted in
Then, when a log outputting timing comes (YES at S1), the information processing apparatus 1 specifies a generation time point of a specific incident as depicted in
Then, as depicted in
Further, as depicted in
For example, a log used in an investigation of an incident of an investigation target has high possibility that it may have been outputted at a time point close to the generation time point of the incident of the investigation target. Therefore, the information processing apparatus 1 performs concealment of the logs included in the log information 231 such that the confidentiality of a log outputted at a time point close to the generation time point of the incident of the investigation target becomes lower than the confidentiality of any other log.
Then, the information processing apparatus 1 outputs the first logs and the second logs (log information 231a) obtained by the conversion of the character information at S4 and S5 as depicted in
This makes it possible for the information processing apparatus 1 to make the confidentiality of a log, which has high possibility in use in the investigation, relatively low and make the confidentiality of a log, which has low possibility in use in the investigation, relatively high. Therefore, the information processing apparatus 1 may maintain the confidentiality of logs that are not used in an investigation by the person in charge of support without obstructing the investigation by the person in charge of support.
Now, details of the first embodiment are described.
First, a process for performing accumulation of incident information 131 (hereinafter referred to also as incident accumulation process) from within the log outputting process is described.
As depicted in
Then, if a new incident occurs (YES at S11), the incident formation unit 111 forms incident information 131 including the substance of the incident having occurred by the process at S11 (S12). Thereafter, the information management unit 112 of the information processing apparatus 1 stores the incident information 131 formed by the process at S12 into the information storage region 130 (S13). In the following, a particular example of the incident information 131 is described.
[Particular Example of Incident Information]
Further, the incident information 131 depicted in
For example, in the incident information 131 depicted in
Referring back to
Now, the log outputting process other than the incident accumulation process is described.
The generation time point specification unit 113 of the information processing apparatus 1 waits until a log outputting timing comes as depicted in
For example, in “date and time of occurrence” of the incident information 131 depicted in
Thereafter, the log specification unit 114 of the information processing apparatus 1 specifies a period from a time point prior by a given time period to the generation time point specified by the process at S22 to another time point later by a given time period than the generation time point specified by the process at S22 (S23).
For example, when the generation time point specified by the process at S22 is “10:30,” the log specification unit 114 specifies the period from a time point (10:20) prior by 10 minutes to the specified generation time point to a time point (10:40) later by 10 minutes than the specified generation time point as a log acquisition period.
Then log specification unit 114 acquires the logs acquired within the log acquisition period specified by the process at S23 from the log information 231 stored in the storage device 2a (S24). In the following, a particular example of the log information 231 stored in the storage device 2a is described.
[Particular Example of Log Information]
The log information 231 and so forth depicted in
In the log information 231 and so forth depicted in
Further, in the log information 231 depicted in
For example, to a log whose “item number” is “1,” “07:20” is set as “time point,” and as “log substance,” the substance that “AP1 INFO AP1 is activated.” is set as “log substance.” Meanwhile, to a log whose “item number” is “4,” “07:48” is set as “time point,” and “OS ERROR coupling is rejected. IP=10.20.30.40, errno=5656” is set as “log substance.” Description of the other pieces of information included in
Then, the log specification unit 114 acquires, in the process at S24, logs whose time point set to “time point” is included in the log acquisition period specified by the process at S23, for example, from the logs included in the log information 231 depicted in
Consequently, the log specification unit 114 may extract logs that are used with a high degree of possibility when an investigation for an inquiry accepted by the person in charge of support is conducted.
Referring back to
For example, the log specification unit 114 performs morphological division, for example, for character information set in “phenomenon” of the specific incident information 131 and specifies “*TestUser#1*,” “user,” “registration,” “error” and “occurrence.” Here, “user,” “registration,” “error” and “occurrence” are general terms. Therefore, the log specification unit 114 decides that “*TestUser#1*” that is a specific term exists in the incident information 131 corresponding to the specific incident.
Then, if it is decided that a specific term is included in particular incident information 131 (YES at S31), the log specification unit 114 decides whether or not a log including a specific term exists in the logs acquired by the process at S24 (S32).
As a result, if it is decided that a log including a specific term exists in the logs acquired by the process at S24 (YES at S32), the log specification unit 114 updates the log acquisition period specified by the process at S23 to a period from a time point prior by a given time period to the time point at which the log decided to exist by the process at S32 is acquired to another time point later by a given time period than the time point at which the log decided to exist by the process at S32 is acquired (S33).
For example, in “log substance” of the log whose “item number” is 12 among the logs depicted in
For example, each piece of information included in the incident information 131 is, for example, information extracted and set from the substance of an inquiry from a user by the person in charge of support (for example, the substance of a mail transmitted from the user). Therefore, in some cases, each piece of information included in the incident information 131 is not necessarily accurate. Therefore, if a log including a specific term included in “phenomenon” of the incident information 131 exists, the log specification unit 114 decides that the log is a log corresponding to the substance of the inquiry accepted from the user. Then, the log specification unit 114 decides that an event corresponding to the substance of the inquiry accepted from the user occurred at the time point set in “time point” of the existing log and performs updating of the log acquisition period.
Consequently, the log specification unit 114 may extract a log, which has high possibility that it may be used when an investigation for an inquiry accepted by the person in charge of support is to be conducted, with a higher efficiency.
Thereafter, the log specification unit 114 acquires logs acquired within the log acquisition period updated by the process at S33 from the log information 231 stored in the storage device 2a (S34). For example, when the log acquisition period is updated to a period from “10:17” to “10:37,” the log specification unit 114 acquires logs having “item number” set to “10” to “13” from the log information 231 depicted in
On the other hand, if it is decided that no specific term is included in the incident information 131 (NO at S31) or if it is decided that a log including a specific term does not exist in the logs acquired by the process at S24 (NO at S32), the log specification unit 114 does not perform the processes at S33 and S34. For example, in those cases, the log specification unit 114 fails to perform specification of a log corresponding to the substance of the inquiry accepted from the user, and therefore, the log specification unit 114 does not perform updating of the log acquisition period and so forth.
Thereafter, as depicted in
Then, the log specification unit 114 decides whether or not the time point at which login was performed by the user specified by the process at S41 is included in the log acquisition time period specified by the process at S23 (log acquisition period updated by the process at S33) (S42). If it is decided as a result that the time point at which login was performed by the user specified by the process at S41 is not included in the log acquisition period (NO at S42), the log specification unit 114 specifies the time point at which login was performed by the user specified by the process at S41 (S43).
For example, the log specification unit 114 refers to the authentication information 133 stored in the information storage region 130 to specify the time point at which login was performed by the user specified by the process at S41. The authentication information 133 is, for example, information indicative of a time point at which each user performed login or logout to or from each piece of software (software operating on the virtual machine 3). It is to be noted that, where the user specified by the process at S41 has performed login to each of a plurality of pieces of software, the log specification unit 114 may specify a time point earliest among time points at which the user specified by the process at S41 performed login. In the following, a particular example of the authentication information 133 is described.
[Particular Example of Authentication Information]
Then, when the log acquisition period specified by the process at S23 (log acquisition period updated by the process at S33) is a period from “10:17” to “10:37,” “08:02” that is the time point at which User1 performed login is not included in the log acquisition period. Therefore, the log specification unit 114 specifies, for example, in the process at S43, “08:02” that is the time period at which User1 performed login.
Referring back to
Then, the log specification unit 114 acquires the logs acquired within the log acquisition period updated by the process at S44 from the log information 231 stored in the storage device 2a (S45). For example, when the log acquisition period is updated to the period from “08:02” to “10:37,” the log specification unit 114 acquires logs having “5” to “13” in “item number” from the log information 231 depicted in
For example, there is the possibility that a period to be used when an investigation for an inquiry accepted by the person in charge of support may be included within a period after the user who issued the inquiry performed login. Therefore, when the time point at which the user who issued the inquiry performed login to one of pieces of software is prior to the log acquisition time point, the log specification unit 114 advances the start time point such that the login time point is included in the log acquisition time period.
This makes it possible for the log specification unit 114 to extract a log, which is used with a high degree of possibility when an investigation for an inquiry accepted by the person in charge of support is conducted, in higher efficiency.
It is to be noted that, when it is decided that the time point at which login was performed by the user specified by the process at S41 is included in the log acquisition period (YES at S42), the log specification unit 114 does not perform the processes from S43 to S45. For example, in this case, since the log specification unit 114 need not update the start time point of the log acquisition period to a time point before this, the log specification unit 114 does not perform updating or the like of the log acquisition period.
Thereafter, the log specification unit 114 specifies logs acquired within a period from the generation time point specified by the process at S22 (time point at which the log existing by the process at S32 was acquired) to the end time point of the log acquisition period specified by the process at S23 (log acquisition period updated by the process at S33 or the like) from among the logs acquired by the process at S24, S34 or S45 as depicted in
For example, the log specification unit 114 refers, for example, to the utilization information 132 stored in the information storage region 130 to specify a piece of software utilized by the user specified by the process at S41. Then, the log specification unit 114 specifies, for example, a log to whose “substance of log” character information including the character information indicative of the specified piece of software and the character information configured from “ERROR” is set. In the following, a particular example of the utilization information 132 is described.
[Particular Example of Utilization Information]
Therefore, in the process at S51, when the information set to “user” of the incident information 131 described hereinabove with reference to
Here, if the generation time point of an incident is “10:27” and the end time point of the log acquisition time period is “10:37,” only a log whose “item number” is “13” is a log to whose “time point” a point of time between the generation time point of the incident and the end time point of the log acquisition time period is set in the log information 231 depicted in
Referring back to
For example, the log specification unit 114 specifies logs whose “item number” is “15” and “17” as logs to whose “time point” a time point later than “10:37” that is the end time point of the log acquisition time period is set and in whose “log substance” character information including the character information configured from “AP1,” “AP2” or “OS” and the character information configured from “ERROR” is included, for example, from the log information 231 described hereinabove with reference to
For example, there is the possibility that a log to be used when an investigation for an inquiry accepted by the person in charge of support is conducted may have been acquired at a time point later than the log acquisition time period specified by the process at S23 (log acquisition period updated by the process at S33 or the like). Further, a log that is used when an investigation is conducted includes the character information of “ERROR” indicating that an abnormal event has occurred with high possibility.
Therefore, when a log including the character information of “ERROR” does not exist in the logs acquired within a period from the generation time point of the incident and the end time point of the log acquisition time period from among the logs acquired within the log acquisition time period, the log specification unit 114 decides that there is the possibility that the log used when an investigation is performed may have been acquired after the log acquisition time period. Then, the log specification unit 114 in this case updates the end time point of the log acquisition time period to a time point at which the log acquired first is acquired from among the logs acquired after the log acquisition time period and including the character information configured from “AP1,” “AP2” or “OS” and the character information including “ERROR.”
Thereafter, the log specification unit 114 acquires the logs (first logs) acquired within the log acquisition time period updated by the process at S54 from within the log information stored in the storage device 2a (S55). For example, when the log acquisition time period is updated to the period from “08:02” to “10:51,” the log specification unit 114 acquires logs to whose “item number” “5” to “15” are set from within the log information 231 depicted in
On the other hand, if the log specification unit 114 decides in the process at S51 that a log exists (YES at S52), the log specification unit 114 does not perform the processes at S53, S54 and S55. For example, in this case, since there is no necessity to update the end time point of the log acquisition time period to a later time point, the log specification unit 114 does not perform updating and so forth of the log acquisition time period.
Then, as depicted in
It is to be noted that the log specification unit 114 may acquire only part of the logs other than the first logs from within the log information 231 stored in the storage device 2a as second logs. For example, the log specification unit 114 may acquire, as second logs, for example, logs other than the first logs from among logs acquired within a period from a time point prior by a given time period (for example, by one hour) to the generation time point specified by the process at S22 (time point at which the log existing by the process at S32 is acquired) to a time point later by a given time period than the generation time point (for example, later by one hour).
Thereafter, the character information conversion unit 115 of the information processing apparatus 1 converts character information included in logs corresponding to the user specified by the process at S41 and including character information of a specific type from among the first logs acquired by the process at S55 into first character information having confidentiality higher than confidentiality of the character information (S62).
Further, the character information conversion unit 115 converts character information included in the logs including the character information of the specific type from among the second logs acquired by the process at S61 into second character information having confidentiality higher than confidentiality of the first character information (S63). Further, the character information conversion unit 115 converts character information included in the logs other than the logs for which conversion of character information has been performed by the process at S62 from among the first logs acquired by the process at S55 into second character information (S64). In the following, logs after character information of the same is converted by the processes at S62 to S64 are described.
[Particular Example (1) of Log after Conversion of Character Information]
In the following description, it is assumed that conversion into second character information is performed by converting all character information of a conversion target into “XXXX.” Further, it is assumed that conversion into first character information is performed, where the character information of the conversion target is an IP address, by converting it into “IPaddr1,” but where the character information of the conversion target is a user name, by converting it into “Username1.” Further, conversion into first character information is performed, where the character information of the conversion target is a host name, by converting it into “hostname1.” It is to be noted that, in order to ensure the uniqueness of character information before conversion also after the conversion, the “1” at the tail end changes for every piece of character information before the conversion.
Further, it is assumed that conversion into third character information is performed by converting, without changing the number of characters of character information of the conversion target, a numeral included in the character information of the conversion target into “1,” converting an upper case into “A,” converting a lower case into “a,” and converting a symbol into “*.” If the conversion target is in Japanese, for example, a hiragana, a katakana, kanji, and a two-byte-symbol is converted into one character of hiragana, one character of katakana, one character of kanji, and one character of two-byte-symbol for each. It is to be noted that, in order to ensure the uniqueness of character information before conversion also after the conversion, one character at the tail end made different for every piece of character information.
For example, the logs that include the character information configured from “AP1,” “AP2” or “OS” that is software utilized by the user specified by the process at S41 and the character information configured from “ERROR” from among the first logs depicted in
Therefore, the character information conversion unit 115 converts, for example, character information following “hostname=” from within the information set in “log substance” of the log whose “item number” in the log information 231 described hereinabove with reference to
Meanwhile, the logs that do not include any of the character information configured from “AP1,” “AP2” or “OS” that is software utilized by the user specified by the process at S41 and the character information configured from “ERROR” from among the first logs depicted in
Therefore, as indicated by an underlined portion of
For example, the first logs are logs acquired at time points close to the generation time point of the incident of the investigation target. Then, it may be decided that, from among the first logs, a log relating to software utilized by the user from which an inquiry has been issued to the person in charge of support is a log having high possibility that it may be used in an investigation of the incident of the investigation target.
Therefore, the character information conversion unit 115 makes the confidentiality of the log relating to the software utilized by the user specified by the process at S41 from among the first logs lower than the confidentiality of logs relating to software utilized by any other user than the user specified by the process at S41 from among the first logs. Similarly, the character information conversion unit 115 makes the confidentiality of the log relating to the software utilized by the user specified by the process at S41 from among the first logs lower than the confidentiality of the second logs.
Consequently, the information processing apparatus 1 may set the confidentiality of a log, whose possibility that it may be utilized in an investigation is high, relatively low and set the confidentiality of a log, whose possibility that it may be used in an investigation is low, relatively high. Therefore, the information processing apparatus 1 may maintain the confidentiality of logs that are not used in an investigation by the person in charge of support without disturbing the investigation by the person in charge of support.
It is to be noted that the authentication information 133 described with reference to
This makes it possible for the character information conversion unit 115 to further restrict logs whose confidentiality is to be set lower.
Then, the character information conversion unit 115 decides whether or not a log including a specific term exists in the logs converted by the process at S62 as depicted in
If it is decided as a result of the decision that a log including a specific term exists in the logs converted by the process at S62 exists (YES at S71), the character information conversion unit 115 converts character information included in the log corresponding to the user specified by the process at S41 from among the existing logs by the process at S71 into third character information having confidentiality lower than confidentiality of the first character information (S73).
For example, when there exists a log including a specific term included in “phenomenon” of the incident information 131, the character information conversion unit 115 decides that the existing log corresponds to the substance of the inquiry accepted from the user. Therefore, the character information conversion unit 115 decides that the log including the specific term is a log having very high possibility that it may be used in the investigation and further decreases the confidentiality of the log including the specific term. In the following, a log after character information thereof is converted by the process at S73 is described.
[Particular Example (2) of Log after Conversion of Character Information]
Therefore, as indicated by an underlined portion of
This makes it possible for the character information conversion unit 115 to further decrease the possibility that the investigation by the person in charge of support may be obstructed by concealment of logs.
Referring back to
For example, if a log including a specific term included in “phenomenon” of the incident information 131 does not exist, the character information conversion unit 115 fails to specify a log having extremely high possibility that it may be used in the investigation from among the logs included in the first logs. Therefore, the character information conversion unit 115 first decreases, for example, the confidentiality of character information included in the first logs uniformly. In the following, the logs after character information thereof is converted by the process at S72 are described.
[Particular Example (3) of Log after Conversion of Character Information]
First, the incident information 131 depicted in
Here, the character information set in “phenomenon” of the incident information 131 depicted in
Now, particular examples of a log after character information of the same is converted by the process at S72 is described. Among the first logs depicted in
Therefore, as indicated by an underlined portion of
Consequently, even when a log including a specific term included in “phenomenon” of the incident information 131 does not exist, the character information conversion unit 115 may further decrease the possibility that the investigation by the person in charge of support may be disturbed by concealment of logs.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiment of the present invention has been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2017-001029 | Jan 2017 | JP | national |