SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
1939
www.ijarcet.org
DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
Epuru Madhavarao1
, M Parimala2
, Chikkala JayaRaju3
ABSTRACT: Now a day’s Cloud Computing is the
rapid growing technology. Now most of the persons are
using Cloud Computing technology .Cloud computing
enables highly scalable services to be easily consumed
over the Internet on an as-needed basis. A major
feature of the cloud services is that users’ data are
usually processed remotely in unknown machines that
users do not own or operate. While enjoying the
convenience brought by this new emerging technology,
users’ fears of losing control of their own data
(particularly, financial and health data) can become a
significant barrier to the wide adoption of cloud
services. To solve the above problem in this paper we
provide effective mechanism to using accountability
frame work to keep track of the actual usage of the
users’ data in the cloud. In particular, we propose an
object-centered approach that enables enclosing our
logging mechanism together with users’ data and
policies. Accountability is checking of authorization
policies and it is important for transparent data access.
We provide automatic logging mechanisms using JAR
programming which improves security and privacy of
data in cloud. To strengthen user’s control, we also
provide distributed auditing mechanisms. We also
provide secure JVM, this secure JVM is provide the
high security to the user’s or customers. We provide
extensive experimental studies that demonstrate the
efficiency and effectiveness of the proposed approaches.
Keywords: cloud computing, logging, audit ability,
accountability, data sharing, secure JVM.
1. INTRODUCTION:
Cloud computing is the computing the
resources(hardware and software) that are delivered as a
service over a network .The name comes from the shape of
the cloud-shaped symbol as an abstraction for the complex
infrastructure it contains in system diagrams. Cloud
computing entrusts remote services with a user’s data,
software and computation. The below Fig.1.shows that
overview of cloud computing . Cloud computing presents a
new way to supplement the current consumption and
delivery model for IT services based on the Internet, by
providing for dynamically scalable and often virtualized
resources as a service over the Internet. Now a day’s most
of the persons are accessing the large volumes of data from
clouds. In this way they don’t provide the security because
of the wide adaption of cloud services. In this now I am
provide the accountability and secure JVM. This two are
providing the security.
Fig.1.Overview of the cloud computing.
The architectural service layers of cloud computing are:
 Software as a Service(SaaS):This service is a
Software deployment model whereby a provider
licenses an application to customers for use as a
service on demand.
Examples:
 Google app’s,
 Salesforce.com,
 Social Networks.
 Platform as a Service(PaaS):Optimized IT and
developer tools offered through Platform as a
Service(PaaS) for database and testing
environments.
Examples:
 MS-Azure,
 Operating Systems,
 Infrastructure Scaling
 Infrastructure as a Service(IaaS):On-demand
highly scalable computing, storage and hosting
services.
Examples:
 Mainframes,
 Storage
Cloud computing as a fast growing technology
provides many scalable services. It moves user’s data to the
centralized large data centers, where the management of the
data and services may not be fully trustworthy. Users may
not know the machines which actually process and host
their data in a cloud environment. Users also start worrying
about losing control of their own data. The data processed
on clouds are often outsourced, leading to a number of
issues related to accountability, including the handling of
personally identifiable information. Such fears are
becoming a significant to the wide adoption of cloud
services[1]. It is essential to provide an effective
mechanism for users to monitor the usage of their data in
the cloud. For example, users need to be able to ensure that
their data are handled according to the service level
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
1940
www.ijarcet.org
agreements made at the time they sign on for services in the
cloud.
Conventional access control approaches developed
for closed domains such as databases and operating
systems, or approaches using a centralized server in
distributed environments, are not suitable, due to the
following features characterizing cloud environments. First,
data handling can be outsourced by the direct cloud service
provider (CSP) to other entities in the cloud and theses
entities can also delegate the tasks to others, and so on.
Second, entities are allowed to join and leave the cloud in a
flexible manner. As a result, data handling in the cloud
goes through a complex and dynamic hierarchical service
chain which does not exist in conventional environments.
To overcome the above problems, we propose a novel
approach, namely Cloud Information Accountability (CIA)
framework, based on the notion of information
accountability [3]. Unlike privacy protection technologies
which are built on the hide-it-or-lose-it perspective,
information accountability focuses on keeping the data
usage transparent and track able. Our proposed CIA
framework provides end-to-end accountability in a highly
distributed fashion. One of the main innovative features of
the CIA framework lies in its ability of maintaining
lightweight and powerful accountability that combines
aspects of access control, usage control and authentication.
By means of the CIA, data owners can track not only
whether or not the service-level agreements are being
honored, but also enforce access and usage control rules as
needed. Associated with the accountability feature, we also
develop two distinct modes for auditing: push mode and
pull mode. The push mode refers to logs being periodically
sent to the data owner or stakeholder while the pull mode
refers to an alternative approach whereby the user (or
another authorized party) can retrieve the logs as needed.
Fig.2.Cloud Computing Services
The above Fig.2.shows that cloud computing services.
There is a number of notable commercial and individual
cloud computing services, like Amazon, Google, Microsoft,
Yahoo, and Sales force [2].
2. EXISTING PROBLEM STATEMENT:
The use of Conventional access control approaches
developed for closed domains such as databases and
operating systems, or approaches using a centralized server
in distributed environments, are not suitable, due to the two
following reasons.
 First, data handling can be outsourced by the
direct cloud service provider (CSP) to other
entities in the cloud and theses entities can also
delegate the tasks to others, and so on.
 Second, entities are allowed to join and leave the
cloud in a flexible manner.
As a result, data handling in the cloud goes through a
complex and dynamic hierarchical service chain which
does not exist in conventional environments [4].
In one existing system the user’s private data are sent
to the cloud in an encrypted form, and the processing is
done on the encrypted data. The output of the processing is
de-obfuscated by the privacy manager to reveal the correct
result[5][6]. However, the privacy manager provides only
limited features in that it does not guarantee protection
once the data are being disclosed. In another existing
system an agent-based system specific to grid computing.
Distributed jobs, along with the resource consumption at
local machines are tracked by static software agents. But it
is mainly focused on resource consumption and on tracking
of sub-jobs processed at multiple computing nodes, rather
than access control.
Drawbacks from existing system given below:
 The conventional access control approach must
require any dedicated authentication and storage
system.
 The user cannot have the information regarding
usage or access of data by other users.
 Requires third-party services to complete the
monitoring and focuses on lower level
monitoring of system resources.
3. PROPOSED SYSTEM:
The Cloud Information Accountability frame work
proposed in this work conducts automated logging
Distributed auditing of relevant access performed by any
entity, carried out at any point of time at any cloud service
provider[7]. It has two major components: logger and log
harmonizer. The JAR file includes a set of simple access
control rules specifying whether and how the cloud servers
and possibly other data stakeholders are authorized to
access the content itself. Apart from that we are going to
check the integrity of the JRE on the systems on which the
logger components is initiated. This integrity checks are
carried out by using oblivious hashing .The proposed
methodology will also take concern of the JAR file by
converting the JAR into obfuscated code which will adds
an additional layer of security to the infrastructure. Apart
from that we are going to extend the security of user's data
by provable data possessions for integrity verification.
Depending on the configuration settings defined at the time
of creation, the JAR will provide usage control associated
with logging, or will provide only logging functionality. As
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
1941
www.ijarcet.org
for the logging, each time there is an access to the data, the
JAR will automatically generate a log record. In the
above proposed system, we provide secure JVM; this
secure JVM is providing the high security to the data
owners. A Java virtual machine (JVM) is a virtual
machine that can execute Java byte code. It is the code
execution component of the Java platform. Sun
Microsystems has stated that there are over 5.5 billion
JVM-enabled devices.
A Java virtual machine is a program which executes
certain other programs, namely those containing Java byte
code instructions. JVM's are most often implemented to run
on an existing operating system, but can also be
implemented to run directly on hardware. A JVM provides
a run-time environment in which Java byte code can be
executed, enabling features such as automated exception
handling, which provides root-cause debugging
information for every software error (exception). A JVM is
distributed along with Java Class Library, a set of standard
class libraries (in Java byte code) that implement the
Java application programming interface (API). These
libraries, bundled together with the JVM, form the Java
Runtime Environment (JRE).
Fig.3. overview of the proposed system.
JVMs are available for many hardware and
software platforms. The use of the same byte code for all
JVMs on all platforms allows Java to be described as
a write once, run anywhere programming language,
versus write once, compile anywhere, which describes
cross-platform compiled languages. Thus, the JVM is a
crucial component of the Java platform. Java byte code is
an intermediate language which is typically compiled from
Java, but it can also be compiled from other programming
languages. For example, Ada source code can be compiled
to Java byte code and executed on a JVM.
Oracle Corporation, the owner of
the Java trademark, produces the most widely used JVM,
named Hotspot, that is written in the C++ programming
language.JVMs using the Java trademark may also be
developed by other companies as long as they adhere to the
JVM specification published by Oracle Corporation and to
related contractual obligations.
4. MODULES:
The major buildings modules of proposed systems are Five.
They are.
4.1. DATA OWNER MODULE
4.2. JAR CREATION MODULE
4.3. CLOUD SERVICE PROVIDER MODULE
4.4. Disassembling Attack
4.5. Man-in-the-Middle Attack
4.1. DATA OWNER MODULE:
In this module, the data owner uploads their data in
the cloud server. The new users can register with the
service provider and create a new account and so they can
securely upload the files and store it. For the security
purpose the data owner encrypts the data file and then store
in the cloud. The Data owner can have capable of
manipulating the encrypted data file. And the data owner
can set the access privilege to the encrypted data file. To
allay users’ concerns, it is essential to provide an effective
mechanism for users to monitor the usage of their data in
the cloud. For example, users need to be able to ensure that
their data are handled according to the service level
agreements made at the time they sign on for services in the
cloud.
4.2. JAR CREATION MODULE
In this module we create the jar file for every file
upload. The user should have the same jar file to download
the file. This way the data is going to be secured. The
logging should be decentralized in order to adapt to the
dynamic nature of the cloud. More specifically, log files
should be tightly bounded with the corresponding data
being controlled, and require minimal infrastructural
support from any server. Every access to the user’s data
should be correctly and automatically logged. This requires
integrated techniques to authenticate the entity who
accesses the data, verify, and record the actual operations
on the data as well as the time that the data have been
accessed. Log files should be reliable and tamper proof to
avoid illegal insertion, deletion, and modification by
malicious parties. Recovery mechanisms are also desirable
to restore damaged log files caused by technical problems.
The proposed technique should not intrusively monitor data
recipients’ systems, nor it should introduce heavy
communication and computation overhead, which
otherwise will hinder its feasibility and adoption in
practice.
4.3. CLOUD SERVICE PROVIDER MODULE
The cloud service provider manages a cloud to
provide data storage service. Data owners encrypt their data
files and store them in the cloud with the jar file created for
each file for sharing with data consumers. To access the
shared data files, data consumers download encrypted data
files of their interest from the cloud and then decrypt them.
4.4. DISASSEMBLING ATTACK
In this module we show how our system is
secured by evaluating to possible attacks to disassemble the
JAR file of the logger and then attempt to extract useful
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
1942
www.ijarcet.org
information out of it or spoil the log records in it. Given the
ease of disassembling JAR files, this attack poses one of
the most serious threats to our architecture. Since we
cannot prevent an attacker to gain possession of the JARs,
we rely on the strength of the cryptographic schemes
applied[9]to preserve the integrity and confidentiality of the
logs. Once the JAR files are disassembled, the attacker is in
possession of the public IBE key used for encrypting the
log files, the encrypted log file itself, and the *.class files.
Therefore, the attacker has to rely on learning the private
key or subverting the encryption to read the log records. To
compromise the confidentiality of the log files, the attacker
may try to identify which encrypted log records correspond
to his actions by mounting a chosen plaintext attack to
obtain some pairs of encrypted log records and plain texts.
However, the adoption of the Weil Pairing algorithm
ensures that the CIA framework has both chosen cipher text
security and chosen plaintext security in the random oracle
model. Therefore, the attacker will not be able to decrypt
any data or log files in the disassembled JAR file. Even if
the attacker is an authorized user, he can only access the
actual content file but he is not able to decrypt any other
data including the log files which are viewable only to the
data owner.1 From the disassembled JAR files, the
attackers are not able to directly view the access control
policies either, since the original source code is not
included in the JAR files. If the attacker wants to infer
access control policies, the only possible way is through
analyzing the log file. This is, however, very hard to
accomplish since, as mentioned earlier, log records are
encrypted and breaking the encryption is computationally
hard. Also, the attacker cannot modify the log files
extracted from a disassembled JAR. Would the attacker
erase or tamper a record, the integrity checks added to each
record of the log will not match at the time of verification,
revealing the error. Similarly, attackers will not be able to
write fake records to log files without going undetected,
since they will need to sign with a valid key and the chain
of hashes will not match.
4.5. Man-in-the-Middle Attack.
In this module, an attacker may intercept messages
during the authentication of a service provider with the
certificate authority, and reply the messages in order to
masquerade as a legitimate service provider. There are two
points in time that the attacker can replay the messages.
One is after the actual service provider has completely
disconnected and ended a session with the certificate
authority. The other is when the actual service provider is
disconnected but the session is not over, so the attacker
may try to renegotiate the connection. The first type of
attack will not succeed since the certificate typically has a
time stamp which will become obsolete at the time point of
reuse. The second type of attack will also fail since
renegotiation is banned in the latest version of OpenSSL
and cryptographic checks have been added.
5. CLOUD INFORMATION
ACCOUNTABILITY (CIA):
In this section, we present an overview of the
Cloud Information Accountability framework and discuss
how the CIA framework [8] meets the design requirements
discussed in the previous section. The Cloud Information
Accountability framework proposed in this work conducts
automated logging and distributed auditing of relevant
access performed by any entity, carried out at any point of
time at any cloud service provider.
It has two major components: logger and log harmonizer.
5.1. Major Components:
There are two major components of the CIA, the
first being the logger, and the second being the log
harmonizer. The logger is the component which is strongly
coupled with the user’s data, so that it is downloaded when
the data are accessed, and is copied whenever the data are
copied. It handles a particular instance or copy of the user’s
data and is responsible for logging access to that instance or
copy. The log harmonizer forms the central component
which allows the user access to the log files.
The logger is strongly coupled with user’s data
(either single or multiple data items). Its main tasks include
automatically logging access to data items that it contains,
encrypting the log record using the public key of the
content owner, and periodically sending them to the log
harmonizer. It may also be configured to ensure that access
and usage control policies associated with the data are
honored. For example, a data owner can specify that user X
is only allowed to view but not to modify the data. The
logger will control the data access even after it is
downloaded by user X.
The logger requires only minimal support from the
server (e.g., a valid Java virtual machine installed) in order
to be deployed. The tight coupling between data and
logger, results in a highly distributed logging system,
therefore meeting our first design requirement.
Furthermore, since the logger does not need to be installed
on any system or require any special support from the
server, it is not very intrusive in its actions, thus satisfying
our fifth requirement. Finally, the logger is also responsible
for generating the error correction information for each log
record and sends the same to the log harmonizer. The error
correction information combined with the encryption and
authentication mechanism provides a robust and reliable
recovery mechanism, therefore meeting the third
requirement. The log harmonizer is responsible for
auditing. Being the trusted component, the log harmonizer
generates the master key. It holds on to the decryption key
for the IBE key pair, as it is responsible for decrypting the
logs. Alternatively, the decryption can be carried out on the
client end if the path between the log harmonizer and the
client is not trusted. In this case, the harmonizer sends the
key to the client in a secure key exchange.
It supports two auditing strategies: push and pull.
Under the push strategy, the log file is pushed back to the
data owner periodically in an automated fashion. The pull
mode is an on-demand approach, whereby the log file is
obtained by the data owner as often as requested. These
two modes allow us to satisfy the aforementioned fourth
design requirement. In case there exist multiple loggers for
the same set of data items, the log harmonizer will merge
log records from them before sending back to the data
owner. The log harmonizer is also responsible for handling
log file corruption. In addition, the log harmonizer can
itself carry out logging in addition to auditing. Separating
the logging and auditing functions improves the
performance. The logger and the log harmonizer are both
implemented as lightweight and portable JAR files. The
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
1943
www.ijarcet.org
JAR file implementation provides automatic logging
functions, which meets the second design requirement.
5.1.1. Advantages:
One of the main innovative features of the CIA
framework lies in its ability of maintaining lightweight and
powerful accountability that combines aspects of access
control, usage control and authentication. Providing
defenses against man in middle attack, dictionary attack,
Disassembling Attack, Compromised JVM At-tack, Data
leakage attack.PDP allows the users to remotely verify the
integrity of there data It’s Suitable for limited and large
number of storages.
5.2. Algorithm of Log Retrieval for Push and Pull
mode:
Pushing or Pulling strategies have interesting
tradeoffs. The pushing strategy is beneficial when there are
a large number of accesses to the data within a short period
of time. The pull strategy is most needed when the data
owner suspects some misuse of his data; The pull mode
allows him to monitor the usage of his content
immediately. Supporting both pushing and pulling modes
helps protecting from some nontrivial attacks. The
algorithm presents logging and synchronization steps with
the harmonizer.
The log retrieval algorithm for the push and pull modes:
Fig.3.push and pull algorithm.
5.2. Tools used for implementing cloud
In the proposed model we are using the following tools:
5.2.1. Eucalyptus Cloud
The Eucalyptus Cloud platform is open source software for
building AWS-compatible private and hybrid clouds.
Eucalyptus supports Amazon web services EC2 and S3
interfaces. It pools together existing virtualized
infrastructure to create cloud resources for compute,
network and storage.
5.2.2. Amazon EC2
Amazon Elastic compute cloud (EC2) is a central part of
Amazon.com’s cloud computing platform, Amazon web
Services (AWS). EC2 allows users to rent virtual
computers on which to run their own Computer
Applications. They are designed for control and
management of VM instances, EBS volumes, elastic IPs,
and security groups and should work well with EC2 and
Eucalyptus [10].
6. CONCLUSION:
This paper presents effective mechanism, which
performs automatic authentication of users and create log
records of each data access by the user. Data owner can
audit his content on cloud, and he can get the confirmation
that his data is safe on the cloud. Data owner also able to
know the duplication of data made without his knowledge.
Data owner should not worry about his data on cloud using
this mechanism and data usage is transparent, using this
mechanism.
In future we would like to develop a cloud, on
which we will install JRE and JVM, to do the
authentication of JAR. Try to improve security of store data
and to reduce log record generation time.
REFERENCES:
[1] S.Pearson and A.Charlesworth, “Accountability as a
Way Forward for Privacy Protection in the cloud”,
Proc.Frist Int’1 Conf. Cloud Computing, 2009.
[2] P.T Jaeger, J .Lin and J.M. Grimes, “Cloud Computing
and Information Policy: Computing in a Policy Cloud?”, J.
Information Technology and Policies, vol. 5, no. 3, pp.
269-289, 2009
[3]D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen-
baum, J. Handler, and G.J. Sussman, “Information
Accountability”, Comm.ACM,vol. 51,no. 6,pp. 82-87,2008
[4]Ensuring Distributed Accountability for Data Sharing in
the Cloud Author, Smitha Sundareswaran, Anna
C.Squicciarini, Member, IEEE, and Dan Lin, IEEE
Transactions on Dependable and Secure Computing ,VOL
9,NO,4 July/August 2012
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
1944
www.ijarcet.org
[5] S.Pearson, Y.Shen, and M. Mowbray, “A Privacy
Manager for Cloud Computing”, proc.Int’1 Conf.Cloud
Computing (CloudCom),pp. 90-106,2009.
[6]T.Mather, S.Kumaraswamy, and S.Latif, Cloud Security
and Privacy: An Enterprise Perspective on Risks and
Compliance (Theory in Practice), first ed. O’Reilly, 2009.
[7] Nilutpal Bose, Mrs. G. Manimala, “SECURE
FRAMEWORK FOR DATA SHARING IN CLOUD
COMPUTING ENVIRONMENT, Website:
www.ijetae.com, Volume 3, Special Issue 1, January 2013)
[8]Ensuring Distributed Accountability for Data Sharing in
the Cloud Author, Smitha Sundareswaran, Anna
C.Squicciarini, Member, IEEE, and Dan Lin, IEEE
Transactions on Dependable and Secure Computing ,VOL
9,NO,4 July/August 2012
[9] D.Boneh and M.K. Franklin, “Identity-Based
Encryption from the Weil Pairing”, Proc.Int’1
Cryptography Conf.Advances in Cryptology,pp. 213-
229,2001.
[10]EucalyptusSystems, http://www.eucalyptus.com/,2012.
Author’s Profile:
EPURU MADHAVARAO, received the Bachelor of
engineering degree in Information Technology from NIET
Andhra Pradesh, India. Now Pursuing M.Tech in
department of computer science and engineering in
Vignan's Lara Institute of Technology &
Science,Vadlamudi, affiliated to JNTUK,Guntur,A.P,India.
M PARIMALA is currently serving as a Assistant
professor (CSE) in Vignan's Lara Institute of Technology
& Science, Vadlamudi, Guntur, A.P., India.
CHIKKALA JAYARAJU, received the bachelor of
engineering degree in Information Technology from QIS
Engineering College Andhra Pradesh, India. Now Pursuing
M.Tech in department of computer science and engineering
in Vignan's Lara Institute of Technology &
Science,Vadlamudi,affliated to JNTUK,Guntur,A.P,India .

Contenu connexe

Tendances

Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudChanakya Chandu
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 

Tendances (20)

Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
R180203114117
R180203114117R180203114117
R180203114117
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Fog doc
Fog doc Fog doc
Fog doc
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 

En vedette

Hipervinculos leydi
Hipervinculos leydiHipervinculos leydi
Hipervinculos leydiflor951
 
منتقى الألفاظ بتقريب علوم الحديث للحفاظ
منتقى الألفاظ بتقريب علوم الحديث للحفاظمنتقى الألفاظ بتقريب علوم الحديث للحفاظ
منتقى الألفاظ بتقريب علوم الحديث للحفاظمحمد ابو الهيجاء
 
Ijarcet vol-2-issue-3-891-896
Ijarcet vol-2-issue-3-891-896Ijarcet vol-2-issue-3-891-896
Ijarcet vol-2-issue-3-891-896Editor IJARCET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Promotion Group flexiplay ny
Promotion Group flexiplay nyPromotion Group flexiplay ny
Promotion Group flexiplay nyPavel Sidorenco
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
ใบงานสำรวจตนเอง M6 46
ใบงานสำรวจตนเอง M6 46ใบงานสำรวจตนเอง M6 46
ใบงานสำรวจตนเอง M6 46Chayagon Mongkonsawat
 
Dhea rahmayanti xii ips 3
Dhea rahmayanti xii ips 3Dhea rahmayanti xii ips 3
Dhea rahmayanti xii ips 3Paarief Udin
 
Human sustainability
Human sustainabilityHuman sustainability
Human sustainabilitymwett001
 
Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Editor IJARCET
 
Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332Editor IJARCET
 

En vedette (18)

Hipervinculos leydi
Hipervinculos leydiHipervinculos leydi
Hipervinculos leydi
 
منتقى الألفاظ بتقريب علوم الحديث للحفاظ
منتقى الألفاظ بتقريب علوم الحديث للحفاظمنتقى الألفاظ بتقريب علوم الحديث للحفاظ
منتقى الألفاظ بتقريب علوم الحديث للحفاظ
 
Ijarcet vol-2-issue-3-891-896
Ijarcet vol-2-issue-3-891-896Ijarcet vol-2-issue-3-891-896
Ijarcet vol-2-issue-3-891-896
 
1762 1765
1762 17651762 1765
1762 1765
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
1825 1828
1825 18281825 1828
1825 1828
 
Promotion Group flexiplay ny
Promotion Group flexiplay nyPromotion Group flexiplay ny
Promotion Group flexiplay ny
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Khelshi
KhelshiKhelshi
Khelshi
 
ใบงานสำรวจตนเอง M6 46
ใบงานสำรวจตนเอง M6 46ใบงานสำรวจตนเอง M6 46
ใบงานสำรวจตนเอง M6 46
 
Dhea rahmayanti xii ips 3
Dhea rahmayanti xii ips 3Dhea rahmayanti xii ips 3
Dhea rahmayanti xii ips 3
 
Human sustainability
Human sustainabilityHuman sustainability
Human sustainability
 
Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336
 
Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332
 
A new-look-at-rpo-final
A new-look-at-rpo-finalA new-look-at-rpo-final
A new-look-at-rpo-final
 
1918 1923
1918 19231918 1923
1918 1923
 

Similaire à Volume 2-issue-6-1939-1944

Similaire à Volume 2-issue-6-1939-1944 (20)

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Test
TestTest
Test
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Volume 2-issue-6-1939-1944

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 1939 www.ijarcet.org DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY Epuru Madhavarao1 , M Parimala2 , Chikkala JayaRaju3 ABSTRACT: Now a day’s Cloud Computing is the rapid growing technology. Now most of the persons are using Cloud Computing technology .Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To solve the above problem in this paper we provide effective mechanism to using accountability frame work to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. Accountability is checking of authorization policies and it is important for transparent data access. We provide automatic logging mechanisms using JAR programming which improves security and privacy of data in cloud. To strengthen user’s control, we also provide distributed auditing mechanisms. We also provide secure JVM, this secure JVM is provide the high security to the user’s or customers. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches. Keywords: cloud computing, logging, audit ability, accountability, data sharing, secure JVM. 1. INTRODUCTION: Cloud computing is the computing the resources(hardware and software) that are delivered as a service over a network .The name comes from the shape of the cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user’s data, software and computation. The below Fig.1.shows that overview of cloud computing . Cloud computing presents a new way to supplement the current consumption and delivery model for IT services based on the Internet, by providing for dynamically scalable and often virtualized resources as a service over the Internet. Now a day’s most of the persons are accessing the large volumes of data from clouds. In this way they don’t provide the security because of the wide adaption of cloud services. In this now I am provide the accountability and secure JVM. This two are providing the security. Fig.1.Overview of the cloud computing. The architectural service layers of cloud computing are:  Software as a Service(SaaS):This service is a Software deployment model whereby a provider licenses an application to customers for use as a service on demand. Examples:  Google app’s,  Salesforce.com,  Social Networks.  Platform as a Service(PaaS):Optimized IT and developer tools offered through Platform as a Service(PaaS) for database and testing environments. Examples:  MS-Azure,  Operating Systems,  Infrastructure Scaling  Infrastructure as a Service(IaaS):On-demand highly scalable computing, storage and hosting services. Examples:  Mainframes,  Storage Cloud computing as a fast growing technology provides many scalable services. It moves user’s data to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Users may not know the machines which actually process and host their data in a cloud environment. Users also start worrying about losing control of their own data. The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. Such fears are becoming a significant to the wide adoption of cloud services[1]. It is essential to provide an effective mechanism for users to monitor the usage of their data in the cloud. For example, users need to be able to ensure that their data are handled according to the service level
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 1940 www.ijarcet.org agreements made at the time they sign on for services in the cloud. Conventional access control approaches developed for closed domains such as databases and operating systems, or approaches using a centralized server in distributed environments, are not suitable, due to the following features characterizing cloud environments. First, data handling can be outsourced by the direct cloud service provider (CSP) to other entities in the cloud and theses entities can also delegate the tasks to others, and so on. Second, entities are allowed to join and leave the cloud in a flexible manner. As a result, data handling in the cloud goes through a complex and dynamic hierarchical service chain which does not exist in conventional environments. To overcome the above problems, we propose a novel approach, namely Cloud Information Accountability (CIA) framework, based on the notion of information accountability [3]. Unlike privacy protection technologies which are built on the hide-it-or-lose-it perspective, information accountability focuses on keeping the data usage transparent and track able. Our proposed CIA framework provides end-to-end accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication. By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed. Associated with the accountability feature, we also develop two distinct modes for auditing: push mode and pull mode. The push mode refers to logs being periodically sent to the data owner or stakeholder while the pull mode refers to an alternative approach whereby the user (or another authorized party) can retrieve the logs as needed. Fig.2.Cloud Computing Services The above Fig.2.shows that cloud computing services. There is a number of notable commercial and individual cloud computing services, like Amazon, Google, Microsoft, Yahoo, and Sales force [2]. 2. EXISTING PROBLEM STATEMENT: The use of Conventional access control approaches developed for closed domains such as databases and operating systems, or approaches using a centralized server in distributed environments, are not suitable, due to the two following reasons.  First, data handling can be outsourced by the direct cloud service provider (CSP) to other entities in the cloud and theses entities can also delegate the tasks to others, and so on.  Second, entities are allowed to join and leave the cloud in a flexible manner. As a result, data handling in the cloud goes through a complex and dynamic hierarchical service chain which does not exist in conventional environments [4]. In one existing system the user’s private data are sent to the cloud in an encrypted form, and the processing is done on the encrypted data. The output of the processing is de-obfuscated by the privacy manager to reveal the correct result[5][6]. However, the privacy manager provides only limited features in that it does not guarantee protection once the data are being disclosed. In another existing system an agent-based system specific to grid computing. Distributed jobs, along with the resource consumption at local machines are tracked by static software agents. But it is mainly focused on resource consumption and on tracking of sub-jobs processed at multiple computing nodes, rather than access control. Drawbacks from existing system given below:  The conventional access control approach must require any dedicated authentication and storage system.  The user cannot have the information regarding usage or access of data by other users.  Requires third-party services to complete the monitoring and focuses on lower level monitoring of system resources. 3. PROPOSED SYSTEM: The Cloud Information Accountability frame work proposed in this work conducts automated logging Distributed auditing of relevant access performed by any entity, carried out at any point of time at any cloud service provider[7]. It has two major components: logger and log harmonizer. The JAR file includes a set of simple access control rules specifying whether and how the cloud servers and possibly other data stakeholders are authorized to access the content itself. Apart from that we are going to check the integrity of the JRE on the systems on which the logger components is initiated. This integrity checks are carried out by using oblivious hashing .The proposed methodology will also take concern of the JAR file by converting the JAR into obfuscated code which will adds an additional layer of security to the infrastructure. Apart from that we are going to extend the security of user's data by provable data possessions for integrity verification. Depending on the configuration settings defined at the time of creation, the JAR will provide usage control associated with logging, or will provide only logging functionality. As
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 1941 www.ijarcet.org for the logging, each time there is an access to the data, the JAR will automatically generate a log record. In the above proposed system, we provide secure JVM; this secure JVM is providing the high security to the data owners. A Java virtual machine (JVM) is a virtual machine that can execute Java byte code. It is the code execution component of the Java platform. Sun Microsystems has stated that there are over 5.5 billion JVM-enabled devices. A Java virtual machine is a program which executes certain other programs, namely those containing Java byte code instructions. JVM's are most often implemented to run on an existing operating system, but can also be implemented to run directly on hardware. A JVM provides a run-time environment in which Java byte code can be executed, enabling features such as automated exception handling, which provides root-cause debugging information for every software error (exception). A JVM is distributed along with Java Class Library, a set of standard class libraries (in Java byte code) that implement the Java application programming interface (API). These libraries, bundled together with the JVM, form the Java Runtime Environment (JRE). Fig.3. overview of the proposed system. JVMs are available for many hardware and software platforms. The use of the same byte code for all JVMs on all platforms allows Java to be described as a write once, run anywhere programming language, versus write once, compile anywhere, which describes cross-platform compiled languages. Thus, the JVM is a crucial component of the Java platform. Java byte code is an intermediate language which is typically compiled from Java, but it can also be compiled from other programming languages. For example, Ada source code can be compiled to Java byte code and executed on a JVM. Oracle Corporation, the owner of the Java trademark, produces the most widely used JVM, named Hotspot, that is written in the C++ programming language.JVMs using the Java trademark may also be developed by other companies as long as they adhere to the JVM specification published by Oracle Corporation and to related contractual obligations. 4. MODULES: The major buildings modules of proposed systems are Five. They are. 4.1. DATA OWNER MODULE 4.2. JAR CREATION MODULE 4.3. CLOUD SERVICE PROVIDER MODULE 4.4. Disassembling Attack 4.5. Man-in-the-Middle Attack 4.1. DATA OWNER MODULE: In this module, the data owner uploads their data in the cloud server. The new users can register with the service provider and create a new account and so they can securely upload the files and store it. For the security purpose the data owner encrypts the data file and then store in the cloud. The Data owner can have capable of manipulating the encrypted data file. And the data owner can set the access privilege to the encrypted data file. To allay users’ concerns, it is essential to provide an effective mechanism for users to monitor the usage of their data in the cloud. For example, users need to be able to ensure that their data are handled according to the service level agreements made at the time they sign on for services in the cloud. 4.2. JAR CREATION MODULE In this module we create the jar file for every file upload. The user should have the same jar file to download the file. This way the data is going to be secured. The logging should be decentralized in order to adapt to the dynamic nature of the cloud. More specifically, log files should be tightly bounded with the corresponding data being controlled, and require minimal infrastructural support from any server. Every access to the user’s data should be correctly and automatically logged. This requires integrated techniques to authenticate the entity who accesses the data, verify, and record the actual operations on the data as well as the time that the data have been accessed. Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and modification by malicious parties. Recovery mechanisms are also desirable to restore damaged log files caused by technical problems. The proposed technique should not intrusively monitor data recipients’ systems, nor it should introduce heavy communication and computation overhead, which otherwise will hinder its feasibility and adoption in practice. 4.3. CLOUD SERVICE PROVIDER MODULE The cloud service provider manages a cloud to provide data storage service. Data owners encrypt their data files and store them in the cloud with the jar file created for each file for sharing with data consumers. To access the shared data files, data consumers download encrypted data files of their interest from the cloud and then decrypt them. 4.4. DISASSEMBLING ATTACK In this module we show how our system is secured by evaluating to possible attacks to disassemble the JAR file of the logger and then attempt to extract useful
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 1942 www.ijarcet.org information out of it or spoil the log records in it. Given the ease of disassembling JAR files, this attack poses one of the most serious threats to our architecture. Since we cannot prevent an attacker to gain possession of the JARs, we rely on the strength of the cryptographic schemes applied[9]to preserve the integrity and confidentiality of the logs. Once the JAR files are disassembled, the attacker is in possession of the public IBE key used for encrypting the log files, the encrypted log file itself, and the *.class files. Therefore, the attacker has to rely on learning the private key or subverting the encryption to read the log records. To compromise the confidentiality of the log files, the attacker may try to identify which encrypted log records correspond to his actions by mounting a chosen plaintext attack to obtain some pairs of encrypted log records and plain texts. However, the adoption of the Weil Pairing algorithm ensures that the CIA framework has both chosen cipher text security and chosen plaintext security in the random oracle model. Therefore, the attacker will not be able to decrypt any data or log files in the disassembled JAR file. Even if the attacker is an authorized user, he can only access the actual content file but he is not able to decrypt any other data including the log files which are viewable only to the data owner.1 From the disassembled JAR files, the attackers are not able to directly view the access control policies either, since the original source code is not included in the JAR files. If the attacker wants to infer access control policies, the only possible way is through analyzing the log file. This is, however, very hard to accomplish since, as mentioned earlier, log records are encrypted and breaking the encryption is computationally hard. Also, the attacker cannot modify the log files extracted from a disassembled JAR. Would the attacker erase or tamper a record, the integrity checks added to each record of the log will not match at the time of verification, revealing the error. Similarly, attackers will not be able to write fake records to log files without going undetected, since they will need to sign with a valid key and the chain of hashes will not match. 4.5. Man-in-the-Middle Attack. In this module, an attacker may intercept messages during the authentication of a service provider with the certificate authority, and reply the messages in order to masquerade as a legitimate service provider. There are two points in time that the attacker can replay the messages. One is after the actual service provider has completely disconnected and ended a session with the certificate authority. The other is when the actual service provider is disconnected but the session is not over, so the attacker may try to renegotiate the connection. The first type of attack will not succeed since the certificate typically has a time stamp which will become obsolete at the time point of reuse. The second type of attack will also fail since renegotiation is banned in the latest version of OpenSSL and cryptographic checks have been added. 5. CLOUD INFORMATION ACCOUNTABILITY (CIA): In this section, we present an overview of the Cloud Information Accountability framework and discuss how the CIA framework [8] meets the design requirements discussed in the previous section. The Cloud Information Accountability framework proposed in this work conducts automated logging and distributed auditing of relevant access performed by any entity, carried out at any point of time at any cloud service provider. It has two major components: logger and log harmonizer. 5.1. Major Components: There are two major components of the CIA, the first being the logger, and the second being the log harmonizer. The logger is the component which is strongly coupled with the user’s data, so that it is downloaded when the data are accessed, and is copied whenever the data are copied. It handles a particular instance or copy of the user’s data and is responsible for logging access to that instance or copy. The log harmonizer forms the central component which allows the user access to the log files. The logger is strongly coupled with user’s data (either single or multiple data items). Its main tasks include automatically logging access to data items that it contains, encrypting the log record using the public key of the content owner, and periodically sending them to the log harmonizer. It may also be configured to ensure that access and usage control policies associated with the data are honored. For example, a data owner can specify that user X is only allowed to view but not to modify the data. The logger will control the data access even after it is downloaded by user X. The logger requires only minimal support from the server (e.g., a valid Java virtual machine installed) in order to be deployed. The tight coupling between data and logger, results in a highly distributed logging system, therefore meeting our first design requirement. Furthermore, since the logger does not need to be installed on any system or require any special support from the server, it is not very intrusive in its actions, thus satisfying our fifth requirement. Finally, the logger is also responsible for generating the error correction information for each log record and sends the same to the log harmonizer. The error correction information combined with the encryption and authentication mechanism provides a robust and reliable recovery mechanism, therefore meeting the third requirement. The log harmonizer is responsible for auditing. Being the trusted component, the log harmonizer generates the master key. It holds on to the decryption key for the IBE key pair, as it is responsible for decrypting the logs. Alternatively, the decryption can be carried out on the client end if the path between the log harmonizer and the client is not trusted. In this case, the harmonizer sends the key to the client in a secure key exchange. It supports two auditing strategies: push and pull. Under the push strategy, the log file is pushed back to the data owner periodically in an automated fashion. The pull mode is an on-demand approach, whereby the log file is obtained by the data owner as often as requested. These two modes allow us to satisfy the aforementioned fourth design requirement. In case there exist multiple loggers for the same set of data items, the log harmonizer will merge log records from them before sending back to the data owner. The log harmonizer is also responsible for handling log file corruption. In addition, the log harmonizer can itself carry out logging in addition to auditing. Separating the logging and auditing functions improves the performance. The logger and the log harmonizer are both implemented as lightweight and portable JAR files. The
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 1943 www.ijarcet.org JAR file implementation provides automatic logging functions, which meets the second design requirement. 5.1.1. Advantages: One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication. Providing defenses against man in middle attack, dictionary attack, Disassembling Attack, Compromised JVM At-tack, Data leakage attack.PDP allows the users to remotely verify the integrity of there data It’s Suitable for limited and large number of storages. 5.2. Algorithm of Log Retrieval for Push and Pull mode: Pushing or Pulling strategies have interesting tradeoffs. The pushing strategy is beneficial when there are a large number of accesses to the data within a short period of time. The pull strategy is most needed when the data owner suspects some misuse of his data; The pull mode allows him to monitor the usage of his content immediately. Supporting both pushing and pulling modes helps protecting from some nontrivial attacks. The algorithm presents logging and synchronization steps with the harmonizer. The log retrieval algorithm for the push and pull modes: Fig.3.push and pull algorithm. 5.2. Tools used for implementing cloud In the proposed model we are using the following tools: 5.2.1. Eucalyptus Cloud The Eucalyptus Cloud platform is open source software for building AWS-compatible private and hybrid clouds. Eucalyptus supports Amazon web services EC2 and S3 interfaces. It pools together existing virtualized infrastructure to create cloud resources for compute, network and storage. 5.2.2. Amazon EC2 Amazon Elastic compute cloud (EC2) is a central part of Amazon.com’s cloud computing platform, Amazon web Services (AWS). EC2 allows users to rent virtual computers on which to run their own Computer Applications. They are designed for control and management of VM instances, EBS volumes, elastic IPs, and security groups and should work well with EC2 and Eucalyptus [10]. 6. CONCLUSION: This paper presents effective mechanism, which performs automatic authentication of users and create log records of each data access by the user. Data owner can audit his content on cloud, and he can get the confirmation that his data is safe on the cloud. Data owner also able to know the duplication of data made without his knowledge. Data owner should not worry about his data on cloud using this mechanism and data usage is transparent, using this mechanism. In future we would like to develop a cloud, on which we will install JRE and JVM, to do the authentication of JAR. Try to improve security of store data and to reduce log record generation time. REFERENCES: [1] S.Pearson and A.Charlesworth, “Accountability as a Way Forward for Privacy Protection in the cloud”, Proc.Frist Int’1 Conf. Cloud Computing, 2009. [2] P.T Jaeger, J .Lin and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?”, J. Information Technology and Policies, vol. 5, no. 3, pp. 269-289, 2009 [3]D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen- baum, J. Handler, and G.J. Sussman, “Information Accountability”, Comm.ACM,vol. 51,no. 6,pp. 82-87,2008 [4]Ensuring Distributed Accountability for Data Sharing in the Cloud Author, Smitha Sundareswaran, Anna C.Squicciarini, Member, IEEE, and Dan Lin, IEEE Transactions on Dependable and Secure Computing ,VOL 9,NO,4 July/August 2012
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 1944 www.ijarcet.org [5] S.Pearson, Y.Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing”, proc.Int’1 Conf.Cloud Computing (CloudCom),pp. 90-106,2009. [6]T.Mather, S.Kumaraswamy, and S.Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice), first ed. O’Reilly, 2009. [7] Nilutpal Bose, Mrs. G. Manimala, “SECURE FRAMEWORK FOR DATA SHARING IN CLOUD COMPUTING ENVIRONMENT, Website: www.ijetae.com, Volume 3, Special Issue 1, January 2013) [8]Ensuring Distributed Accountability for Data Sharing in the Cloud Author, Smitha Sundareswaran, Anna C.Squicciarini, Member, IEEE, and Dan Lin, IEEE Transactions on Dependable and Secure Computing ,VOL 9,NO,4 July/August 2012 [9] D.Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing”, Proc.Int’1 Cryptography Conf.Advances in Cryptology,pp. 213- 229,2001. [10]EucalyptusSystems, http://www.eucalyptus.com/,2012. Author’s Profile: EPURU MADHAVARAO, received the Bachelor of engineering degree in Information Technology from NIET Andhra Pradesh, India. Now Pursuing M.Tech in department of computer science and engineering in Vignan's Lara Institute of Technology & Science,Vadlamudi, affiliated to JNTUK,Guntur,A.P,India. M PARIMALA is currently serving as a Assistant professor (CSE) in Vignan's Lara Institute of Technology & Science, Vadlamudi, Guntur, A.P., India. CHIKKALA JAYARAJU, received the bachelor of engineering degree in Information Technology from QIS Engineering College Andhra Pradesh, India. Now Pursuing M.Tech in department of computer science and engineering in Vignan's Lara Institute of Technology & Science,Vadlamudi,affliated to JNTUK,Guntur,A.P,India .