SlideShare une entreprise Scribd logo
1  sur  16
INTRODUCTION:INTRODUCTION:
 CLOUD computing presents a new way to supplement the current
consumption and delivery model for IT services based on the
Internet.
 While enjoying the convenience brought by this new technology,
users also start worrying about losing control of their own data.
 In the context of cloud, accountability is a set of approaches to
addresses two key problems:
 Lack of consumer trust in cloud service providers
 Difficulty faced by cloud service providers with compliance
across geographic boundaries
 Emphasis is on data protection, but the notion of accountability
encompasses more than just privacy
ABSTRACT:ABSTRACT:
 Though the Cloud Service Provider (CSP) gives the privacy and
integrity of the data, this tracks the actual usage of the user’s data
in the cloud by using novel highly decentralized framework data
and policies
 An object-centered approach that enables enclosing our logging
mechanism together with users’ data and policies.
 By leverageing the JAR programmable capabilities to both create a
dynamic and traveling object.
 To strengthen user’s control, also provide distributed auditing
mechanisms.
EXISTING SYSTEM:EXISTING SYSTEM:
 Data handling can be outsourced by the direct cloud service
provider (CSP) to other entities in the cloud and theses entities can
also delegate the tasks to others, and so on.
 Entities are allowed to join and leave the cloud in a flexible manner.
As a result, data handling in the cloud goes through a complex and
dynamic hierarchical service chain which does not exist in
conventional environments
 No log and JAR files created for this system

Data in the cloud may be of encrypted form
PROPOSED SYSTEM:PROPOSED SYSTEM:
 As the cloud provider gives the access of the resources to the
cloud user’s, the data owner keeps track of usage of their
resources.
 It also provides authenticated usage of data in the cloud.
 Proposed CIA framework provides end-to end accountability in a
highly distributed fashion..
 By means of the CIA, data owners can track not only whether or
not the service-level agreements.
Advantage Of Proposed System:
 Novel automatic and enforceable logging mechanism in the cloud.
 Proposed architecture is platform independent and highly
decentralized, in that it does not require any dedicated
authentication or storage system in place.
 Provide a certain degree of usage control for the protected data
after these are delivered to the receiver
 The results demonstrate the efficiency, scalability, and granularity
of our approach. We also provide a detailed security analysis and
discuss the reliability and strength of our architecture.
Literature Survey
1.Toward Publicly Auditable Secure Cloud Data Storage
Services
The authors propose that publicly auditable cloud data storage is
able to help this nascent cloud economy become fully established.
With public auditability, a trusted entity with expertise and
capabilities data owners do not possess can be delegated as an
external audit party to assess the risk of outsourced data when
needed.
 Such an auditing service not only helps save data owners’
computation resources but also provides a transparent yet cost-
effective method for data owners to gain trust in the cloud. The
author describe approaches and system requirements that should
be brought into consideration, and outline challenges that need to
be resolved for such a publicly auditable secure cloud storage
service to become a reality
2.Identity-Based Authentication for Cloud Computing
The authors propose an identity-based encryption (IBE) and
decryption and identity-based signature (IBS) schemes for
IBHMCC. based on the former IBE and IBS schemes, an
identitybased authentication for cloud computing (IBACC) is
proposed.The author presented an identity based authentication
for cloudcomputing, based on the identity-based hierarchical
model for cloud computing (IBHMCC) and corresponding
encryption and signature schemes
3.Online data storage using implicit security
The authors have described an implicit security architecture
suited for the application of online storage. In this scheme data is
partitioned in such a way that each partition is implicitly secure and
does not need to be encrypted. These partitions are stored on
different servers on the network which are known only to the
user. Reconstruction of the data requires access to each server
and the knowledge as to which servers the data partitions are
stored..
HARDWARE REQUIREMENTSHARDWARE REQUIREMENTS::
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:SOFTWARE REQUIREMENTS:
 Operating System : Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
 Database Connectivity : JDBC.
ARCHITECTURE DIAGRAM:ARCHITECTURE DIAGRAM:
MODULES:MODULES:
1. Cloud Information Accountability (CIA) Framework
2. Distinct mode for auditing:
3. Logging and auditing Techniques .
4. Components of CIA
MODULES:MODULES:
1. Cloud Information Accountability (CIA)
Framework:
 CIA framework lies in its ability of maintaining lightweight and
powerful accountability.
 By means of the CIA, data owners can track not only whether or
not the service-level agreements are being honored, but also
enforce access and usage control rules as needed.
2. Distinct mode for auditing:
Push mode:
 The push mode refers to logs being periodically sent to the data
owner or stakeholder.
Pull mode:
 Pull mode refers to an alternative approach whereby the user
 (Or another authorized party) can retrieve the logs as needed.
3. Logging and auditing Techniques:
1. The logging should be decentralized in order to adapt to the
dynamic nature of the cloud..
2. Every access to the user’s data should be correctly and
automatically logged.
3. Log files should be reliable and tamper proof to avoid illegal
insertion, deletion, and modification by malicious parties.
4. Log files should be sent back to their data owners periodically to
inform them of the current usage of their data.
5. The proposed technique should not intrusively monitor data
recipients’ systems.
4. Major components of CIA:
 There are two major components of the CIA, the first being the
logger, and the second being the log harmonizer.
 The logger is strongly coupled with user’s data (either single or
multiple data items).
 It may also be configured to ensure that access and usage control
policies associated with the data are honored.
CONCLUSIONCONCLUSION
 Innovative approaches for automatically logging any access to the
data in the cloud together with an auditing mechanism is proposed.
 Approach allows the data owner to not only audit his content but
also enforce strong back-end protection if needed. Moreover, one
of the main features of our work is that it enables the data owner
to audit even those copies of its data that were made without his
knowledge.
 In the future, planed to refine our approach to verify the integrity
and the authentication of JARs
Thank You!

Contenu connexe

En vedette (14)

5anbcquvtfgv1pvhfif9 140508053553-phpapp01 (1)
5anbcquvtfgv1pvhfif9 140508053553-phpapp01 (1)5anbcquvtfgv1pvhfif9 140508053553-phpapp01 (1)
5anbcquvtfgv1pvhfif9 140508053553-phpapp01 (1)
 
Adrianalimabikinibodyworkoutdietplan
AdrianalimabikinibodyworkoutdietplanAdrianalimabikinibodyworkoutdietplan
Adrianalimabikinibodyworkoutdietplan
 
Do1c
Do1cDo1c
Do1c
 
#jeet
#jeet#jeet
#jeet
 
Checkupload1 140213043220-phpapp01
Checkupload1 140213043220-phpapp01Checkupload1 140213043220-phpapp01
Checkupload1 140213043220-phpapp01
 
Interactive upload
Interactive uploadInteractive upload
Interactive upload
 
scheduled changed settings
scheduled changed settingsscheduled changed settings
scheduled changed settings
 
Pdf docu
Pdf docuPdf docu
Pdf docu
 
Ppt1x present
Ppt1x presentPpt1x present
Ppt1x present
 
bitch please
bitch pleasebitch please
bitch please
 
Sample
SampleSample
Sample
 
Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)
 
Drive present
Drive presentDrive present
Drive present
 
Pptx present
Pptx presentPptx present
Pptx present
 

Similaire à Pp1t

Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudEditor IJCATR
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 

Similaire à Pp1t (19)

Test
TestTest
Test
 
Test
TestTest
Test
 
Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
C04932125
C04932125C04932125
C04932125
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 

Plus de Nitish Bhardwaj

Plus de Nitish Bhardwaj (20)

Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Docx document
Docx documentDocx document
Docx document
 
Doc1x
Doc1xDoc1x
Doc1x
 
10 Famous Quotes on Sachin Tendulkar
10 Famous Quotes on Sachin Tendulkar10 Famous Quotes on Sachin Tendulkar
10 Famous Quotes on Sachin Tendulkar
 
Check the latest tool
Check the latest toolCheck the latest tool
Check the latest tool
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Docx document
Docx documentDocx document
Docx document
 
Do1c
Do1cDo1c
Do1c
 
Doc1x
Doc1xDoc1x
Doc1x
 
Internet of-things-slideshare-140819153732-phpapp01
Internet of-things-slideshare-140819153732-phpapp01Internet of-things-slideshare-140819153732-phpapp01
Internet of-things-slideshare-140819153732-phpapp01
 
Drivepresent 140702005121-phpapp01
Drivepresent 140702005121-phpapp01Drivepresent 140702005121-phpapp01
Drivepresent 140702005121-phpapp01
 
Drivepresent 140702005121-phpapp01
Drivepresent 140702005121-phpapp01Drivepresent 140702005121-phpapp01
Drivepresent 140702005121-phpapp01
 
Drivepresent 140702005121-phpapp01
Drivepresent 140702005121-phpapp01Drivepresent 140702005121-phpapp01
Drivepresent 140702005121-phpapp01
 
Beautifulplanetearthafrica 140801155400-phpapp01
Beautifulplanetearthafrica 140801155400-phpapp01Beautifulplanetearthafrica 140801155400-phpapp01
Beautifulplanetearthafrica 140801155400-phpapp01
 
Nbhardwa w7n1
Nbhardwa w7n1Nbhardwa w7n1
Nbhardwa w7n1
 
Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)
 
Doc1x
Doc1xDoc1x
Doc1x
 
PPT upload
PPT uploadPPT upload
PPT upload
 
Checkupload1 140213043220-phpapp01 (1)
Checkupload1 140213043220-phpapp01 (1)Checkupload1 140213043220-phpapp01 (1)
Checkupload1 140213043220-phpapp01 (1)
 
Docx document
Docx documentDocx document
Docx document
 

Dernier

CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦anilsa9823
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls KolkataHigh Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Short-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptxShort-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptxHenryBriggs2
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceanilsa9823
 
Russian Call Girls Kolkata Amaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Amaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Amaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Amaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our EscortsVIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...aditipandeya
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 
Cyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberAgent, Inc.
 
VIP Kolkata Call Girl Entally 👉 8250192130 Available With Room
VIP Kolkata Call Girl Entally 👉 8250192130  Available With RoomVIP Kolkata Call Girl Entally 👉 8250192130  Available With Room
VIP Kolkata Call Girl Entally 👉 8250192130 Available With Roomdivyansh0kumar0
 
slideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhanslideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhanhanshkumar9870
 
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...wyqazy
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfProbe Gold
 

Dernier (20)

Rohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls 🫤 Nehru Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
Call Girls 🫤 Nehru Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOYCall Girls 🫤 Nehru Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOY
Call Girls 🫤 Nehru Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
 
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
 
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls KolkataHigh Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Short-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptxShort-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptx
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
 
Call Girls Service Green Park @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Green Park @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Green Park @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Green Park @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Russian Call Girls Kolkata Amaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Amaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Amaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Amaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Preet Vihar (Delhi) 9953330565 Escorts, Call Girls Services
Preet Vihar (Delhi) 9953330565 Escorts, Call Girls ServicesPreet Vihar (Delhi) 9953330565 Escorts, Call Girls Services
Preet Vihar (Delhi) 9953330565 Escorts, Call Girls Services
 
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our EscortsVIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
Cyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdf
 
VIP Kolkata Call Girl Entally 👉 8250192130 Available With Room
VIP Kolkata Call Girl Entally 👉 8250192130  Available With RoomVIP Kolkata Call Girl Entally 👉 8250192130  Available With Room
VIP Kolkata Call Girl Entally 👉 8250192130 Available With Room
 
slideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhanslideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhan
 
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdf
 
Call Girls In South Delhi 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Delhi 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Delhi 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Delhi 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 

Pp1t

  • 1. INTRODUCTION:INTRODUCTION:  CLOUD computing presents a new way to supplement the current consumption and delivery model for IT services based on the Internet.  While enjoying the convenience brought by this new technology, users also start worrying about losing control of their own data.  In the context of cloud, accountability is a set of approaches to addresses two key problems:  Lack of consumer trust in cloud service providers  Difficulty faced by cloud service providers with compliance across geographic boundaries  Emphasis is on data protection, but the notion of accountability encompasses more than just privacy
  • 2. ABSTRACT:ABSTRACT:  Though the Cloud Service Provider (CSP) gives the privacy and integrity of the data, this tracks the actual usage of the user’s data in the cloud by using novel highly decentralized framework data and policies  An object-centered approach that enables enclosing our logging mechanism together with users’ data and policies.  By leverageing the JAR programmable capabilities to both create a dynamic and traveling object.  To strengthen user’s control, also provide distributed auditing mechanisms.
  • 3. EXISTING SYSTEM:EXISTING SYSTEM:  Data handling can be outsourced by the direct cloud service provider (CSP) to other entities in the cloud and theses entities can also delegate the tasks to others, and so on.  Entities are allowed to join and leave the cloud in a flexible manner. As a result, data handling in the cloud goes through a complex and dynamic hierarchical service chain which does not exist in conventional environments  No log and JAR files created for this system  Data in the cloud may be of encrypted form
  • 4. PROPOSED SYSTEM:PROPOSED SYSTEM:  As the cloud provider gives the access of the resources to the cloud user’s, the data owner keeps track of usage of their resources.  It also provides authenticated usage of data in the cloud.  Proposed CIA framework provides end-to end accountability in a highly distributed fashion..  By means of the CIA, data owners can track not only whether or not the service-level agreements.
  • 5. Advantage Of Proposed System:  Novel automatic and enforceable logging mechanism in the cloud.  Proposed architecture is platform independent and highly decentralized, in that it does not require any dedicated authentication or storage system in place.  Provide a certain degree of usage control for the protected data after these are delivered to the receiver  The results demonstrate the efficiency, scalability, and granularity of our approach. We also provide a detailed security analysis and discuss the reliability and strength of our architecture.
  • 6. Literature Survey 1.Toward Publicly Auditable Secure Cloud Data Storage Services The authors propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established. With public auditability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed.  Such an auditing service not only helps save data owners’ computation resources but also provides a transparent yet cost- effective method for data owners to gain trust in the cloud. The author describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality
  • 7. 2.Identity-Based Authentication for Cloud Computing The authors propose an identity-based encryption (IBE) and decryption and identity-based signature (IBS) schemes for IBHMCC. based on the former IBE and IBS schemes, an identitybased authentication for cloud computing (IBACC) is proposed.The author presented an identity based authentication for cloudcomputing, based on the identity-based hierarchical model for cloud computing (IBHMCC) and corresponding encryption and signature schemes 3.Online data storage using implicit security The authors have described an implicit security architecture suited for the application of online storage. In this scheme data is partitioned in such a way that each partition is implicitly secure and does not need to be encrypted. These partitions are stored on different servers on the network which are known only to the user. Reconstruction of the data requires access to each server and the knowledge as to which servers the data partitions are stored..
  • 8. HARDWARE REQUIREMENTSHARDWARE REQUIREMENTS::  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:SOFTWARE REQUIREMENTS:  Operating System : Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0  Database Connectivity : JDBC.
  • 10. MODULES:MODULES: 1. Cloud Information Accountability (CIA) Framework 2. Distinct mode for auditing: 3. Logging and auditing Techniques . 4. Components of CIA
  • 11. MODULES:MODULES: 1. Cloud Information Accountability (CIA) Framework:  CIA framework lies in its ability of maintaining lightweight and powerful accountability.  By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed.
  • 12. 2. Distinct mode for auditing: Push mode:  The push mode refers to logs being periodically sent to the data owner or stakeholder. Pull mode:  Pull mode refers to an alternative approach whereby the user  (Or another authorized party) can retrieve the logs as needed.
  • 13. 3. Logging and auditing Techniques: 1. The logging should be decentralized in order to adapt to the dynamic nature of the cloud.. 2. Every access to the user’s data should be correctly and automatically logged. 3. Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and modification by malicious parties. 4. Log files should be sent back to their data owners periodically to inform them of the current usage of their data. 5. The proposed technique should not intrusively monitor data recipients’ systems.
  • 14. 4. Major components of CIA:  There are two major components of the CIA, the first being the logger, and the second being the log harmonizer.  The logger is strongly coupled with user’s data (either single or multiple data items).  It may also be configured to ensure that access and usage control policies associated with the data are honored.
  • 15. CONCLUSIONCONCLUSION  Innovative approaches for automatically logging any access to the data in the cloud together with an auditing mechanism is proposed.  Approach allows the data owner to not only audit his content but also enforce strong back-end protection if needed. Moreover, one of the main features of our work is that it enables the data owner to audit even those copies of its data that were made without his knowledge.  In the future, planed to refine our approach to verify the integrity and the authentication of JARs