Assuring Data Sharing and Culpability as a Service in Cloud
| International Journal of Computer Trends and Technology (IJCTT) | |
© - May Issue 2013 by IJCTT Journal | ||
Volume-4 Issue-5 | ||
Year of Publication : 2013 | ||
Authors :A Sreekanth, Sri K Ishthaq Ahamed |
A Sreekanth, Sri K Ishthaq Ahamed "Assuring Data Sharing and Culpability as a Service in Cloud"International Journal of Computer Trends and Technology (IJCTT),V4(5):1312-1317 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - CLOUD computing presents a replacement thanks to supplement the present consumption and delivery model for IT services supported the net, by providing for dynamically accessible and sometimes virtualized resources as a service over the net. Data handling is outsourced by the direct cloud service Provider (CSP) to alternative entities within the cloud and theses entities may delegate the tasks to others, and so on. Second, entities area unit allowed affixing and leaving the cloud in a very versatile manner. As a result, data handling within the cloud goes through a compound and dynamic stratified service chain that doesn`t exist in standard environments. The Cloud Information Accountability framework planned during this work conducts machine-controlled work logging and distributed auditing of relevant access performed by any entity, applied at any purpose of your time at any cloud service Provider. Its 2 major components: Logger and log harmonizer. The JAR file includes a collection of simple access control rules specifying whether or not and the way the cloud servers and presumably alternative data stakeholder’s area unit approved to access the content itself. Once the authentication succeeds, the service providers are allowed to access the information within the JAR. Based on the configuration settings outlined at the time of creation, the JAR can give usage control related to work, or can give solely logging functionality. As for the work, on every instance there`s associate in having access to the information, the JAR can instinctively generate a log record.
References-
[1] P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007.
[3] Smitha Sundareswaran, Anna C. Squicciarini, and Dan Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 4, JULY/AUGUST 2012
[4] D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.
[5] R. Bose and J. Frew, “Lineage Retrieval for Scientific Data Processing: A Survey,” ACM Computing Surveys, vol. 37, pp. 1- 28, Mar. 2005.
[6] P. Buneman, A. Chapman, and J. Cheney, “Provenance Management in Curated Databases,” Proc. ACM SIGMOD Int’l Conf.Management of Data (SIGMOD ’06), pp. 539-550, 2006.
[7] B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004.
[8] OASIS Security Services Technical Committee, “Security Assertion Markup Language (saml) 2.0,” http://www.oasis-open.org/committees/tc home.php?wg abbrev=security, 2012.
Keywords — Cloud Computing, Accountability, Data Sharing. I