Method for Secure Resource Sharing at User Level In Cloud Computing

Authors

  • M. Swapna  Assistant Professor, Department of Information Technology in Teegala Krisha Reddy Engineering College, Telangana, India
  • Ch. Silas Emmanuel  UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
  • Md. Asrar Ahmed  UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
  • R. Nithish  UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
  • K. Raghavendra  UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India

Keywords:

Process Access Control, Formal Specifica- tion and Verification, Cloud Computing

Abstract

Sharing of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. Despite the hype surrounding cloud computing, organizations are still reluctant to deploy their businesses in the cloud computing environment due to concerns in secure resource sharing. In this paper, we propose a cloud resource mediation service offered by cloud service providers, which plays the role of trusted third party among its different processes. This paper formally specifies the resource sharing mechanism between two different processes in the presence of our proposed cloud resource mediation service. The correctness of permission register and delegation mech- anism among different processes using two distinct algorithms (Register,Message processing and verification) is also demonstrated using formal verification. The performance analysis suggest that sharing of resources can be performed securely and efficiently across different processes of the cloud.

References

  1. B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation and Performance: The 3 P’s of Distributed Data Management,”technical report, Stanford Univ., 2008.
  2. V.N. Murty, “Counting the Integer Solutions of a Linear Equation with Unit Coefficients,” Math. Magazine, vol. 54, no. 2, pp. 79-81, 1981.
  3. S.U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani, “Towards Robustness in Query Auditing,” Proc. 32nd Int’l Conf. Very Large Data Bases (VLDB ’06), VLDB Endowment, pp. 151-162,2006.
  4. P. Papadimitriou and H. Garcia-Molina, “Data Leakage Detection,” technical report, Stanford Univ., 2008.
  5. P.M. Pardalos and S.A. Vavasis, “Quadratic Programming with One Negative Eigenvalue Is NP-
  6. Hard,” J. Global Optimization, vol. 1, no. 1, pp. 15-22, 1991.
  7. J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright
  8. Protection,” IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.
  9. R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,” Proc. ACM SIGMOD, pp. 98-109, 2003.
  10. L. Sweeney, “Achieving K-Anonymity Privacy Protection Using Generalization and Suppression,” http://en.scientificcommons.org/ 43196131, 2002.
  11. Gartner Inc: Gartner identifies the Top 10 strategic technologies for 2011. Online. Available: . Accessed: 15-Jul-2011 http://www.gartner.com/it/page.jsp?id=1454221 Online. Available: . Accessed: 15-Jul-2011
  12. Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N: Cloud Computing: A Statistics Aspect of Users. In First International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer Berlin; 2009:347–358.Google Scholar

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. Swapna, Ch. Silas Emmanuel, Md. Asrar Ahmed, R. Nithish, K. Raghavendra, " Method for Secure Resource Sharing at User Level In Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.994-1001, March-April-2018.