Method for Secure Resource Sharing at User Level In Cloud Computing

Authors(5) :-M. Swapna, Ch. Silas Emmanuel, Md. Asrar Ahmed, R. Nithish, K. Raghavendra

Sharing of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. Despite the hype surrounding cloud computing, organizations are still reluctant to deploy their businesses in the cloud computing environment due to concerns in secure resource sharing. In this paper, we propose a cloud resource mediation service offered by cloud service providers, which plays the role of trusted third party among its different processes. This paper formally specifies the resource sharing mechanism between two different processes in the presence of our proposed cloud resource mediation service. The correctness of permission register and delegation mech- anism among different processes using two distinct algorithms (Register,Message processing and verification) is also demonstrated using formal verification. The performance analysis suggest that sharing of resources can be performed securely and efficiently across different processes of the cloud.

Authors and Affiliations

M. Swapna
Assistant Professor, Department of Information Technology in Teegala Krisha Reddy Engineering College, Telangana, India
Ch. Silas Emmanuel
UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
Md. Asrar Ahmed
UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
R. Nithish
UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
K. Raghavendra
UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India

Process Access Control, Formal Specifica- tion and Verification, Cloud Computing

  1. B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation and Performance: The 3 P’s of Distributed Data Management,”technical report, Stanford Univ., 2008.
  2. V.N. Murty, “Counting the Integer Solutions of a Linear Equation with Unit Coefficients,” Math. Magazine, vol. 54, no. 2, pp. 79-81, 1981.
  3. S.U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani, “Towards Robustness in Query Auditing,” Proc. 32nd Int’l Conf. Very Large Data Bases (VLDB ’06), VLDB Endowment, pp. 151-162,2006.
  4. P. Papadimitriou and H. Garcia-Molina, “Data Leakage Detection,” technical report, Stanford Univ., 2008.
  5. P.M. Pardalos and S.A. Vavasis, “Quadratic Programming with One Negative Eigenvalue Is NP-
  6. Hard,” J. Global Optimization, vol. 1, no. 1, pp. 15-22, 1991.
  7. J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright
  8. Protection,” IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.
  9. R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,” Proc. ACM SIGMOD, pp. 98-109, 2003.
  10. L. Sweeney, “Achieving K-Anonymity Privacy Protection Using Generalization and Suppression,” http://en.scientificcommons.org/ 43196131, 2002.
  11. Gartner Inc: Gartner identifies the Top 10 strategic technologies for 2011. Online. Available: . Accessed: 15-Jul-2011 http://www.gartner.com/it/page.jsp?id=1454221 Online. Available: . Accessed: 15-Jul-2011
  12. Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N: Cloud Computing: A Statistics Aspect of Users. In First International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer Berlin; 2009:347–358.Google Scholar

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 994-1001
Manuscript Number : CSEIT1833493
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. Swapna, Ch. Silas Emmanuel, Md. Asrar Ahmed, R. Nithish, K. Raghavendra, "Method for Secure Resource Sharing at User Level In Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.994-1001, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833493

Article Preview

Follow Us

Contact Us