DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To solve the above problem in this paper we provide effective mechanism to using accountability frame work to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. Accountability is checking of authorization policies and it is important for transparent data access. We provide automatic logging mechanisms using JAR programming which improves security and privacy of data in cloud. To strengthen user’s control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.
Authors and Affiliations
Epuru Madhavarao , M PARIMALA , Chikkala JayaRaju,
SECURE DATA DELIVERY USING GEOGRAPHIC MULTICAST ROUTING
In MANET group communication is an important characteristic which can be implemented through Multicasting. MANET has a dynamic topology through which the mobile nodes keep changing their location and thus it doesn’t have...
Design of Multilayer High Impedance Surface for Antenna Applications
In the recent years High Impedance structures are drawing lot of interest in electromagnetic and antenna community. Due to compact sizes of electronic devices, required radiating element to be placed closed vicinity...
Modified Dactylogram Sifting
Fingerprint recognition has been with success utilized by enforcement agencies to spot suspects and victims for nearly a hundred years. Recent advances in automated fingerprint identification technology, in addition...
A Comprehensive Study of Major Techniques of Facial Expression Recognition
Facial Expression Recognition is one of the challenging and active research topic in the recent years. Facial Expression Recognition System comprises the detection of face, facial feature extraction and classificat...
A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Cloud computing is the emerging technology and also it requires strong security when dealing with public cloud data. Cloud access control is one of the security requirements. The basic security requirements for cloud sto...