Data Allocation in the Cloud Using Distributed Accountability
Keywords:
Cloud Computing, Logging, Audit Ability, Accountability, Data Sharing, Secure JVM.Abstract
Now a day's Cloud Computing is the rapid growing technology. Now most of the persons are using Cloud Computing technology .Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To solve the above problem in this paper we provide effective mechanism to using accountability frame work to keep track of the actual usage of the users' data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. Accountability is checking of authorization policies and it is important for transparent data access. We provide automatic logging mechanisms using JAR programming which improves security and privacy of data in cloud. To strengthen user's control, we also provide distributed auditing mechanisms. We also provide secure JVM, this secure JVM is provide the high security to the user's or customers. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.
References
- S.Pearson and A.Charlesworth, "Accountability as a Way Forward for Privacy Protection in the cloud", Proc.Frist Int’1 Conf. Cloud Computing, 2009.
- P.T Jaeger, J .Lin and J.M. Grimes, "Cloud Computing and Information Policy: Computing in a Policy Cloud?", J. Information Technology and Policies, vol. 5, no. 3, pp. 269-289, 2009
- D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen-baum, J. Handler, and G.J. Sussman, "Information Accountability", Comm.ACM,vol. 51,no. 6,pp. 82-87,2008
- Ensuring Distributed Accountability for Data Sharing in the Cloud Author, Smitha Sundareswaran, Anna C.Squicciarini, Member, IEEE, and Dan Lin, IEEE Transactions on Dependable and Secure Computing ,VOL 9,NO,4 July/August 2012
- S.Pearson, Y.Shen, and M. Mowbray, "A Privacy Manager for Cloud Computing", proc.Int’1 Conf.Cloud Computing (CloudCom),pp. 90-106,2009.
- T.Mather, S.Kumaraswamy, and S.Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice), first ed. O’Reilly, 2009.
- Nilutpal Bose, Mrs. G. Manimala, "SECURE FRAMEWORK FOR DATA SHARING IN CLOUD COMPUTING ENVIRONMENT, Website: www.ijetae.com, Volume 3, Special Issue 1, January 2013)
- Ensuring Distributed Accountability for Data Sharing in the Cloud Author, Smitha Sundareswaran, Anna C.Squicciarini, Member, IEEE, and Dan Lin, IEEE Transactions on Dependable and Secure Computing ,VOL 9,NO,4 July/August 2012
- D.Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing", Proc.Int’1 Cryptography Conf.Advances in Cryptology,pp. 213-229,2001.
- EucalyptusSystems, http://www.eucalyptus.com/2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.