A Survey on Access Control of Cloud Data  

Abstract

t-Among the emerging technologies, cloud computing provides a flexible, on-demand computing infrastructure for a number of applications. Cloud computing is about moving computing from the single desktop pc/data centres to internet. In cloud computing, user’s data can be put it in the cloud storage and it can be access from the cloud, by the users whenever and wherever they needed. The major feature of the cloud is that user’s data are processed in remote machines, which are unknown to the data owners. Here the security problems are raised. Users fear about their data control, so that they needed to account their data, which are stored in cloud. It can provide accountability for cloud data by using a framework called Cloud Information Accountability (CIA). Here it uses Java Archives (JAR) files for automatically log the usage of user’s data. To strengthen user’s control, it can provide distributed auditing mechanism and also can provide authentication of JAR, it allows the developer to develop powerful application even after they modify the code and the code of the copied code by the attacker.  

Authors and Affiliations

Reshma Sadasivan, , Mrs K. Sangeetha, , Dr. S. Karthik,

Keywords

Related Articles

Small Signal Stability Investigation of SMIB System Using Variable Structure Control 

This paper aims at investigation of small signal stability for a synchronous machine connected to the infinite bus system by variable structure control. Power systems inherently being non linear, so first the linea...

Design of High Speed Binary to Gray Code Converter Using A Novel Two Transistor XOR Gate  

t—In modern era, Ultra low power design has an Active research topic due to its various Applications. In this paper we introduce a novel low power and Area efficient Binary to Gray code converter is implemented...

A Novel approach for Optimizing Cross Layer among Physical Layer and MAC Layer of Infrastructure Based Wireless Network using Genetic Algorithm

Cross-layer awareness optimization is a break out from the layered approach of the OSI Layer communications model having very rigorous boundaries among layers. The CLAO approach transports response dynamically via the la...

Improvement on Multi Group-LEACH Protocol of Wireless Sensor Network

Communication is the major cause of energy depletion in the wireless sensor network, so designing of energy efficient routing algorithm is one of the key challenges that need to be addressed for extending life time of ne...

Improving the efficiency of Monitoring & detecting Intruders in MANET  

Rely on mobile ad hoc networks so many intrusion detection techniques projected based on each node reflexively monitoring the data forwarding by its next hop. This paper projected valued evaluations of false positives an...

Download PDF file
  • EP ID EP93611
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Reshma Sadasivan, , Mrs K. Sangeetha, , Dr. S. Karthik, (2012). A Survey on Access Control of Cloud Data  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(8), 214-218. https://europub.co.uk/articles/-A-93611