DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
Now a day’s Cloud Computing is the rapid growing technology. Now most of the persons are using Cloud Computing technology .Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To solve the above problem in this paper we provide effective mechanism to using accountability frame work to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. Accountability is checking of authorization policies and it is important for transparent data access. We provide automatic logging mechanisms using JAR programming which improves security and privacy of data in cloud. To strengthen user’s control, we also provide distributed auditing mechanisms. We also provide secure JVM, this secure JVM is provide the high security to the user’s or customers. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches
Authors and Affiliations
Epuru Madhavarao , M PARIMALA , CHIKKALA JAYARAJU
A Study of Decision Support System (With reference to Indian Retail Industry)
The retail sector was one of the first sectors to make significant investments in collecting and integrating customer data in data warehouses. Retailers have generally earned a significant return on their IT system...
Effective Load Distribution Over Multipath Networks to Control the Delay
An effective model of delay-controlled Load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known to be...
Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator
A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the w...
An efficient unobservable routing scheme resistant against DoS attacks
Privacy protection for ad hoc networks with low-power wireless devices and lowbandwidth network connection is a very challenging task. A number of anonymous routing schemes have been proposed for ad hoc networks to...
Personal Identification Using Palmprint Biometrics Based on Principal Line Approach
Palmprint is the one of the important biometrics characteristics with higher user acceptance. In palmprint, palm-lines are more important features for personal identification. In this paper, in preprocessing a Gaussian f...