DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
Now a day’s Cloud Computing is the rapid growing technology. Now most of the persons are using Cloud Computing technology .Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To solve the above problem in this paper we provide effective mechanism to using accountability frame work to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. Accountability is checking of authorization policies and it is important for transparent data access. We provide automatic logging mechanisms using JAR programming which improves security and privacy of data in cloud. To strengthen user’s control, we also provide distributed auditing mechanisms. We also provide secure JVM, this secure JVM is provide the high security to the user’s or customers. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches
Authors and Affiliations
Epuru Madhavarao , M PARIMALA , CHIKKALA JAYARAJU
RLC Low Pass Filters Transmission Transient Performance Characteristics Analysis
Filter is considered as a part of an optical system that has the purpose of modifying the intensity, polarization or, in particular, the spectral distribution of light. For reconfigurable filters a signal is applied to t...
IP Spoofing Attack Detection using Route Based Information
IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have...
AOMDV with improved Energy Function
Mobile computing is evolving rapidly with advances in wireless communications and wireless networking protocols. To facilitate communication, most wireless network devices are portable and battery-powered, and th...
INTERLEAVED FORWARD ERROR CORRECTING (FEC) CODES BASED ON BINAR SHUFFLE ALGORITHM (B.S.A)
Forward Error Correcting (FEC) is one of the technique is used for controlling errors without sending any retransmission to sender. Example of forward error correcting codes are hamming, lower-density parity-ch...
A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Cloud computing is the emerging technology and also it requires strong security when dealing with public cloud data. Cloud access control is one of the security requirements. The basic security requirements for cloud sto...