Security and Access Control Evaluation for Cloud Data Centers

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2013 by IJCTT Journal
Volume-4 Issue-3                           
Year of Publication : 2013
Authors :P.Balasubramanian

MLA

P.Balasubramanian "Security and Access Control Evaluation for Cloud Data Centers"International Journal of Computer Trends and Technology (IJCTT),V4(3):311-315 Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Cloud computing is a computing paradigm that enables highly scalable services to be consumed over the Internet on a shared basis. Cloud service providers place data in data centers which is distributed as shared data to the users. Users’ data are usually processed remotely in unknown machines that users do not ownership. Centralized monitoring applications are not suitable in the cloud environment and hence data access is provided on a shared basis by cloud service providers. These shared data values are monitored by different cloud auditing schemes. Cloud Information Accountability is an efficient framework for this auditing. This combines the data aspects of access control, usage control and authentication. CIA uses JAR( Java Archives) files for auditing functionality. Two modes of auditing are push mode and pull mode. The push mode refers to logs that are sent to the data owner in a periodic fashion. The pull mode refers to the scenario wherein any authorized person can access the logs when needed. JAR files log the data values in a periodic manner. These data are sent along with access control policies and logging policies enclosed in JAR files, to cloud service providers. When the data are accessed by any external entity, logging mechanism is automatically triggered. In the proposed system, JAR authentication is provided and JRE integration verification is also provided. The CIA model is enhanced with authentication and integrity analysis models. It is a platform independent accountability management model.

References-

[1] A.Pretschner, F. Schuo¨ tz, C. Schaefer, and T. Walter, “Policy Evolution in Distributed Usage Control,” Electronic Notes Theoretical Computer Science, vol. 244, pp. 109-123, 2009.
[2] S. Pearson and A. Charlesworth, “Accountability as a Way Forward for Privacy Protection in the Cloud,” Proc.First Int’l Conf. Cloud Computing, 2009.
[3] SmithaSundareswaran, Anna C. Squicciarini, and Dan Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud”.IEEE Transactions on Dependable And Secure Computing, Vol. 9, No. 4, July/August 2012.
[4] Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004.
[5] M.C. Mont, S. Pearson, and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services,” Proc. Int’l Workshop Database and Expert Systems Applications (DEXA), pp. 377-382, 2003.

Keywords— Cloud computing, accountability, auditing, data sharing, JAR files, Cloud Information Accountability