SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 568
ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA
SHARING IN THE CLOUD
D. J. Bonde, Mahesh Zite, Sachin Hol, Sandip Shinde, Yogesh Wagh
Abstract
Cloud computing is present a new Technology to Share Data or IT Based Service over the internet. Cloud Service provider are
basically used to handle data to the unknown type of resources [1].for sharing of data over the cloud also used more entities.
Those entities are relevant with each other in the cloud. Also cloud computing technology is provided a approach of Dynamic
data handling .But overcome to this method sharing of data over the cloud is complex process. So that for the solution of this we
are use the new framework know as (CIA)Cloud Information Accountability[3].In the cloud Information Accountability, if any
user are subscribe this type of service, then service provider should provide the Access control or rights. By using the Mechanism
of Access control whole information will be stored in the service provider.CIA also consists of two measure part logger and log
harmonizer. JARs are used to create the Dynamic object. Ensure to this if any user should Access such data or information it will
automatically logging or Authentication to JARs [4].
--------------------------------------------------------------------------***------------------------------------------------------------------------------
1.INTRODUCTION
The Cloud Information Accountability (CIA) is consisting of
Automated logging mechanism. It has categories two measure
part: Logger and log harmonizer [3].
JAR files consist of the collection of the different rules in
which different Authorization of Access should take place.
Each separate logging should carry out through integrity
checks. Created files are contain “Reed-Solomon-Based
encoder” [4].
Creation of JARs - In the creation of JARs, when any user
uploads their file, at that time JARs file is created
automatically. JARs consist of one or more collection of JARs
file. So that it is important method for security purpose.log file
is consist of record of every JARs file [2]. Whenever any
Technical problem cause or Damage log file, that log file are
Restored through the Recovery Mechanism.
Certificate Authority- Certificate Authority is check where
cloud server is Authorize or not [5].CA is providing the
certificate Authority. If any server is not recognizing with CA
(Certificate Authority), then this server is Duplicate or Fraud
server. Before uploading there data in the cloud, Data owner
should check that Particular Server are Recognize with CA or
not [6].
Logger- Cloud server is maintaining the logger. Logger is to
be consisting of detail about user and the data owner who can
Access the particular cloud server. Logger is playing the
important role, while accessing cloud server of particular user.
Also Logger should access the time and IP Address of data
who user should requested [3].
Existing system- In the technique of cloud computing, it
consist of Delivery to data from one resource to other machine
through the internet. Now a day‟s one server should handle the
Multiple Request of user. So that processing time will be
increases simultaneously. So that the management of the
database is not has trustworthy. Also web services are to be
used for the Request and Response [4].
2.LITERATURE SURVEY
Cloud server:-Cloud server means user can use all types of
data which is stored on the cloud server. Data owner can store
his data on the cloud server. When user need data at that time
user can send the request to the cloud server then cloud server
accept the user request and pass to the data owner .when data
owner accept the request of user then data owner search the
data related to the user request then pass this data to the user
throw the cloud server. The cloud server manages the
information [1]
Certificate authority:We need the certificate authority in the
cloud server for to confirm the cloud server again. When any
cloud server is not responding then that server is called as
fraud server. When data owner is stored on the cloud at that
time he checks the cloud server means cloud server is
confirming or not [2].
Jar availability:CIA contain log harmonizer to secure from
attacks on offline JARs. Log harmonizer used to stores error
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 569
correction information. It is also used to recover corrupted
logs. It is also used to Decrypt the log records & handle
duplicate records [5].
Logger:Cloud server is controlled to the logger. Loggers have
all information of the data owner and users who are operating
the Cloud Server. Logger will be used for user or data owner
which operate the cloud server at specific time [3].
3.PROPOSED SYSTEM
We have proposed the new Method know as cloud Information
Accountability. Totally Depends upon Information
Accountability. Information Accountability is consists of
secure transaction of data or file. In the information
Accountability Without proper Authentication no one user
should Access the particular server [1].One of the Advantage
of the (CIA) Cloud Information Accountability is it has Ability
to Maintain the low weight and powerful Accountability that
Access the control or Authentication. Whole workings are to
be done in the two Different modes known as: Push mode And
Pull mode [3].
Detail Security Analysis Mechanism Are also provided.
1. Let TS (NTP) be the network time protocol timestamp.
2. Pull=0
3. Rec :=( UID, ode, Access Type, Result, Time, loc)
4. Cur Time: =TS (NTP)
5. Size=size of (log)//current size of the log
6. if ((cutime-tbeg) <time) &&
(Size < size)&& (pull==0) then
7. Log: = log Encrypt (Rec)//encrypt is the encryption function
used to encrypt the record
8. PING to CJAR //send a PING to the harmonizer to check if
it is alive
9. If PING-CJAR then
10. PUSH RS (Rec) // write the error correcting bits
11. Else
12. EXIT (1)//error if no PING is received
13. End if
14. End if
15. If ((cut time – beg) > time) || (size >=size) ||(pull!=0) then
16.//Check if PING is received
17. If PING-CJAR is received
18. PUSH log//write the log file to the harmonizer
19. RS (log): = NULL // reset the error correction records
20. Beg: = TS (NTP) //reset the beg variable
21. Pull: = 0
22. Else
23. Exit (1) // error if no PING is received
24. End if
25. End if
4.EXPECTED RESULT
Experimental result: In the experiment we first upon create the
log file and measuring the total time overhead of the system.
we can Analyze that in the whole experiment total time
overhead is the „Authentication time‟, „After encryption of log
records‟ and‟ logs time combination‟[7].our Architectural
framework is light weight and the stored data are to be prove
by Actual file and logs.
Authentication Time: During the Authentication of cusp, next
point overhead should occur, but time duration of complete
this authentication is so long [6].when any action required by
JAR, the time taken for the authentication and user end is
same.
Time Taken to Perform Logging: This is the main side of
experiment .in which we have studies the effect of long file
size or logging mechanism performance. We have also
measured the average time, that should used to Access
particular log record [4].the time for the execution is low due
to the every access view the request. When action is about 10
sec then average time is so long or high.
5.CONCLUSION
We have introduced the new method or approach for the
automatically logging mechanism. Logging mechanism is to
provide the strong security of the server over the cloud. Also
we have use the CIA which can help to support the
Authentication mechanism. JARs file is the main aspect of the
experiment. We have to increase the total speed of the file
transmission in the low time over the cloud server.
REFERENCES
[1] Cloud Computing, Principles and Paradigms by John
Wiley & Sons.
[2] Ensuring Distributed Accountability for Data Sharing
in the Cloud Author, Smitha Sundareswaran, Anna
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 570
C.Squicciarini, Member, IEEE, and Dan Lin, IEEE
Transactions on Dependable and Secure Computing
VOL 9, NO,4 July/August 2012 .
[3] S. Pearson and A. Charlesworth, "Accountability as a
Way Forward for Privacy Protection in the Cloud,”
Proc First Int'l conf. Cloud Computing, 2009.
[4]”Reed-Solomon Codes and Their Applications”, S.B.
Wicker and V.K. Bhargava, ed. John Wiley & Sons,
1999.
[5] Hsio Ying Lin,Tzeng.W.G, “A Secure Erasure Code-
Based Cloud Storage System with Secure Data
Forwarding “, IEEE transactions on parallel and
Distributed systems, 2012.
6] Y. Chen et al., “Oblivious Hashing: A Stealthy
Software Integrity Verification Primitive,” Proc. Int‟l
Workshop Information Hiding, F. Petitcolas, ed., pp.
400-414, 2003.
[7] D. Boneh and M.K. Franklin, “Identity-Based
Encryption from the Weil Pairing,” Proc. Int‟l Cryptology
Conf. Advances in Cryptology, pp. 213 229, 2001.

More Related Content

What's hot

SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding kadalisrikanth
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudPvrtechnologies Nellore
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion PacketsAmazon Web Services
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...ijtsrd
 
Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28Xavier Lucas
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudCloudTechnologies
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.prudhvikumar madithati
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationAdz91 Digital Ads Pvt Ltd
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
MongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and RiskSukbum Hong
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_awssaifam
 
AWS BaseCamp: AWS Architecture Fundamentals
AWS BaseCamp: AWS  Architecture FundamentalsAWS BaseCamp: AWS  Architecture Fundamentals
AWS BaseCamp: AWS Architecture FundamentalsNicole Maus
 

What's hot (19)

SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion Packets
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
 
Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
MongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded Transactions
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_aws
 
AWS BaseCamp: AWS Architecture Fundamentals
AWS BaseCamp: AWS  Architecture FundamentalsAWS BaseCamp: AWS  Architecture Fundamentals
AWS BaseCamp: AWS Architecture Fundamentals
 

Viewers also liked

Compressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signalCompressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signaleSAT Publishing House
 
Global issue based power generation expansion planning for a power system
Global issue based power generation expansion planning for a power systemGlobal issue based power generation expansion planning for a power system
Global issue based power generation expansion planning for a power systemeSAT Publishing House
 
A survey report for performance analysis of finite
A survey report for performance analysis of finiteA survey report for performance analysis of finite
A survey report for performance analysis of finiteeSAT Publishing House
 
5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workload5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workloadeSAT Publishing House
 
Low power fpga solution for dab audio decoder
Low power fpga solution for dab audio decoderLow power fpga solution for dab audio decoder
Low power fpga solution for dab audio decodereSAT Publishing House
 
Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3eSAT Publishing House
 
Fpga based computer aided diagnosis of cardiac murmurs and sounds
Fpga based computer aided diagnosis of cardiac murmurs and soundsFpga based computer aided diagnosis of cardiac murmurs and sounds
Fpga based computer aided diagnosis of cardiac murmurs and soundseSAT Publishing House
 
Deceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredDeceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredeSAT Publishing House
 
Effect of basic pretreatment on saccharification of
Effect of basic pretreatment on saccharification ofEffect of basic pretreatment on saccharification of
Effect of basic pretreatment on saccharification ofeSAT Publishing House
 
Comparison of kinetic models for biogas production rate from saw dust
Comparison of kinetic models for biogas production rate from saw dustComparison of kinetic models for biogas production rate from saw dust
Comparison of kinetic models for biogas production rate from saw dusteSAT Publishing House
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallseSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Qoe enhanced social live interactive streaming
Qoe enhanced social live interactive streamingQoe enhanced social live interactive streaming
Qoe enhanced social live interactive streamingeSAT Publishing House
 
Frequency regulation of deregulated power system
Frequency regulation of deregulated power systemFrequency regulation of deregulated power system
Frequency regulation of deregulated power systemeSAT Publishing House
 
Optimization of process parameters for vinegar
Optimization of process parameters for vinegarOptimization of process parameters for vinegar
Optimization of process parameters for vinegareSAT Publishing House
 
Investigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomInvestigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomeSAT Publishing House
 
Optimization of extrusion process for production of
Optimization of extrusion process for production ofOptimization of extrusion process for production of
Optimization of extrusion process for production ofeSAT Publishing House
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlineareSAT Publishing House
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clientseSAT Publishing House
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blasteSAT Publishing House
 

Viewers also liked (20)

Compressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signalCompressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signal
 
Global issue based power generation expansion planning for a power system
Global issue based power generation expansion planning for a power systemGlobal issue based power generation expansion planning for a power system
Global issue based power generation expansion planning for a power system
 
A survey report for performance analysis of finite
A survey report for performance analysis of finiteA survey report for performance analysis of finite
A survey report for performance analysis of finite
 
5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workload5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workload
 
Low power fpga solution for dab audio decoder
Low power fpga solution for dab audio decoderLow power fpga solution for dab audio decoder
Low power fpga solution for dab audio decoder
 
Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3
 
Fpga based computer aided diagnosis of cardiac murmurs and sounds
Fpga based computer aided diagnosis of cardiac murmurs and soundsFpga based computer aided diagnosis of cardiac murmurs and sounds
Fpga based computer aided diagnosis of cardiac murmurs and sounds
 
Deceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredDeceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteered
 
Effect of basic pretreatment on saccharification of
Effect of basic pretreatment on saccharification ofEffect of basic pretreatment on saccharification of
Effect of basic pretreatment on saccharification of
 
Comparison of kinetic models for biogas production rate from saw dust
Comparison of kinetic models for biogas production rate from saw dustComparison of kinetic models for biogas production rate from saw dust
Comparison of kinetic models for biogas production rate from saw dust
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Qoe enhanced social live interactive streaming
Qoe enhanced social live interactive streamingQoe enhanced social live interactive streaming
Qoe enhanced social live interactive streaming
 
Frequency regulation of deregulated power system
Frequency regulation of deregulated power systemFrequency regulation of deregulated power system
Frequency regulation of deregulated power system
 
Optimization of process parameters for vinegar
Optimization of process parameters for vinegarOptimization of process parameters for vinegar
Optimization of process parameters for vinegar
 
Investigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomInvestigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedom
 
Optimization of extrusion process for production of
Optimization of extrusion process for production ofOptimization of extrusion process for production of
Optimization of extrusion process for production of
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinear
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clients
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blast
 

Similar to Ensuring distributed accountability for data sharing in the cloud

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudeSAT Publishing House
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Editor IJCATR
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 

Similar to Ensuring distributed accountability for data sharing in the cloud (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16
 
L01246974
L01246974L01246974
L01246974
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

Ensuring distributed accountability for data sharing in the cloud

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 568 ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD D. J. Bonde, Mahesh Zite, Sachin Hol, Sandip Shinde, Yogesh Wagh Abstract Cloud computing is present a new Technology to Share Data or IT Based Service over the internet. Cloud Service provider are basically used to handle data to the unknown type of resources [1].for sharing of data over the cloud also used more entities. Those entities are relevant with each other in the cloud. Also cloud computing technology is provided a approach of Dynamic data handling .But overcome to this method sharing of data over the cloud is complex process. So that for the solution of this we are use the new framework know as (CIA)Cloud Information Accountability[3].In the cloud Information Accountability, if any user are subscribe this type of service, then service provider should provide the Access control or rights. By using the Mechanism of Access control whole information will be stored in the service provider.CIA also consists of two measure part logger and log harmonizer. JARs are used to create the Dynamic object. Ensure to this if any user should Access such data or information it will automatically logging or Authentication to JARs [4]. --------------------------------------------------------------------------***------------------------------------------------------------------------------ 1.INTRODUCTION The Cloud Information Accountability (CIA) is consisting of Automated logging mechanism. It has categories two measure part: Logger and log harmonizer [3]. JAR files consist of the collection of the different rules in which different Authorization of Access should take place. Each separate logging should carry out through integrity checks. Created files are contain “Reed-Solomon-Based encoder” [4]. Creation of JARs - In the creation of JARs, when any user uploads their file, at that time JARs file is created automatically. JARs consist of one or more collection of JARs file. So that it is important method for security purpose.log file is consist of record of every JARs file [2]. Whenever any Technical problem cause or Damage log file, that log file are Restored through the Recovery Mechanism. Certificate Authority- Certificate Authority is check where cloud server is Authorize or not [5].CA is providing the certificate Authority. If any server is not recognizing with CA (Certificate Authority), then this server is Duplicate or Fraud server. Before uploading there data in the cloud, Data owner should check that Particular Server are Recognize with CA or not [6]. Logger- Cloud server is maintaining the logger. Logger is to be consisting of detail about user and the data owner who can Access the particular cloud server. Logger is playing the important role, while accessing cloud server of particular user. Also Logger should access the time and IP Address of data who user should requested [3]. Existing system- In the technique of cloud computing, it consist of Delivery to data from one resource to other machine through the internet. Now a day‟s one server should handle the Multiple Request of user. So that processing time will be increases simultaneously. So that the management of the database is not has trustworthy. Also web services are to be used for the Request and Response [4]. 2.LITERATURE SURVEY Cloud server:-Cloud server means user can use all types of data which is stored on the cloud server. Data owner can store his data on the cloud server. When user need data at that time user can send the request to the cloud server then cloud server accept the user request and pass to the data owner .when data owner accept the request of user then data owner search the data related to the user request then pass this data to the user throw the cloud server. The cloud server manages the information [1] Certificate authority:We need the certificate authority in the cloud server for to confirm the cloud server again. When any cloud server is not responding then that server is called as fraud server. When data owner is stored on the cloud at that time he checks the cloud server means cloud server is confirming or not [2]. Jar availability:CIA contain log harmonizer to secure from attacks on offline JARs. Log harmonizer used to stores error
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 569 correction information. It is also used to recover corrupted logs. It is also used to Decrypt the log records & handle duplicate records [5]. Logger:Cloud server is controlled to the logger. Loggers have all information of the data owner and users who are operating the Cloud Server. Logger will be used for user or data owner which operate the cloud server at specific time [3]. 3.PROPOSED SYSTEM We have proposed the new Method know as cloud Information Accountability. Totally Depends upon Information Accountability. Information Accountability is consists of secure transaction of data or file. In the information Accountability Without proper Authentication no one user should Access the particular server [1].One of the Advantage of the (CIA) Cloud Information Accountability is it has Ability to Maintain the low weight and powerful Accountability that Access the control or Authentication. Whole workings are to be done in the two Different modes known as: Push mode And Pull mode [3]. Detail Security Analysis Mechanism Are also provided. 1. Let TS (NTP) be the network time protocol timestamp. 2. Pull=0 3. Rec :=( UID, ode, Access Type, Result, Time, loc) 4. Cur Time: =TS (NTP) 5. Size=size of (log)//current size of the log 6. if ((cutime-tbeg) <time) && (Size < size)&& (pull==0) then 7. Log: = log Encrypt (Rec)//encrypt is the encryption function used to encrypt the record 8. PING to CJAR //send a PING to the harmonizer to check if it is alive 9. If PING-CJAR then 10. PUSH RS (Rec) // write the error correcting bits 11. Else 12. EXIT (1)//error if no PING is received 13. End if 14. End if 15. If ((cut time – beg) > time) || (size >=size) ||(pull!=0) then 16.//Check if PING is received 17. If PING-CJAR is received 18. PUSH log//write the log file to the harmonizer 19. RS (log): = NULL // reset the error correction records 20. Beg: = TS (NTP) //reset the beg variable 21. Pull: = 0 22. Else 23. Exit (1) // error if no PING is received 24. End if 25. End if 4.EXPECTED RESULT Experimental result: In the experiment we first upon create the log file and measuring the total time overhead of the system. we can Analyze that in the whole experiment total time overhead is the „Authentication time‟, „After encryption of log records‟ and‟ logs time combination‟[7].our Architectural framework is light weight and the stored data are to be prove by Actual file and logs. Authentication Time: During the Authentication of cusp, next point overhead should occur, but time duration of complete this authentication is so long [6].when any action required by JAR, the time taken for the authentication and user end is same. Time Taken to Perform Logging: This is the main side of experiment .in which we have studies the effect of long file size or logging mechanism performance. We have also measured the average time, that should used to Access particular log record [4].the time for the execution is low due to the every access view the request. When action is about 10 sec then average time is so long or high. 5.CONCLUSION We have introduced the new method or approach for the automatically logging mechanism. Logging mechanism is to provide the strong security of the server over the cloud. Also we have use the CIA which can help to support the Authentication mechanism. JARs file is the main aspect of the experiment. We have to increase the total speed of the file transmission in the low time over the cloud server. REFERENCES [1] Cloud Computing, Principles and Paradigms by John Wiley & Sons. [2] Ensuring Distributed Accountability for Data Sharing in the Cloud Author, Smitha Sundareswaran, Anna
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 570 C.Squicciarini, Member, IEEE, and Dan Lin, IEEE Transactions on Dependable and Secure Computing VOL 9, NO,4 July/August 2012 . [3] S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud,” Proc First Int'l conf. Cloud Computing, 2009. [4]”Reed-Solomon Codes and Their Applications”, S.B. Wicker and V.K. Bhargava, ed. John Wiley & Sons, 1999. [5] Hsio Ying Lin,Tzeng.W.G, “A Secure Erasure Code- Based Cloud Storage System with Secure Data Forwarding “, IEEE transactions on parallel and Distributed systems, 2012. 6] Y. Chen et al., “Oblivious Hashing: A Stealthy Software Integrity Verification Primitive,” Proc. Int‟l Workshop Information Hiding, F. Petitcolas, ed., pp. 400-414, 2003. [7] D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int‟l Cryptology Conf. Advances in Cryptology, pp. 213 229, 2001.