Cloud Computing: A Responsibility data sharing in the cloud computing
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 7
Abstract
Cloud computing provides highly efficient services to be easily accessed or used over the Internet on as needed basis. An important feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. This convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this paper, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object centred approach that enables enclosing our logging mechanism together with users’ data and policies. We leverage the JAR programmable capabilities to both create a dynamic and travelling object, and to ensure that any access to users’ data will trigger authentication and automated logging local to the JARs. To strengthen user’s control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.
Authors and Affiliations
K. Phanindhar#1 , Ch. Suresh
Classification algorithm in Data mining: An Overview
Data Mining is a technique used in various domains to give meaning to the available data Classification is a data mining (machine learning) technique used to predict group membership for data instances. In this pap...
Wireless Sensor networks: Routing protocols, Challenges, Solutions
the most important evolution of the modern era is Wireless Sensors networks. Recent advancements in WSNs also led to the implementation of several new protocols which are to be implemented for proper functioning of...
Offensive Decoy Technology For Cloud Data Attacks
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of...
Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique
Network security risks grow tremendously in recent past, the attacks on computer networks have enhanced hugely and need economical network intrusion detection mechanisms. Data processing and machine-learning techni...
An Efficient Vertical Handoff Technique for TwoTier Heterogeneous Networks
Integration of cellular networks and Wireless local area networks (WLANs) will be very useful for development of fourth generation communication technologies. The integration of two or more networks would be done b...