SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 568
ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA
SHARING IN THE CLOUD
D. J. Bonde, Mahesh Zite, Sachin Hol, Sandip Shinde, Yogesh Wagh
Abstract
Cloud computing is present a new Technology to Share Data or IT Based Service over the internet. Cloud Service provider are
basically used to handle data to the unknown type of resources [1].for sharing of data over the cloud also used more entities.
Those entities are relevant with each other in the cloud. Also cloud computing technology is provided a approach of Dynamic
data handling .But overcome to this method sharing of data over the cloud is complex process. So that for the solution of this we
are use the new framework know as (CIA)Cloud Information Accountability[3].In the cloud Information Accountability, if any
user are subscribe this type of service, then service provider should provide the Access control or rights. By using the Mechanism
of Access control whole information will be stored in the service provider.CIA also consists of two measure part logger and log
harmonizer. JARs are used to create the Dynamic object. Ensure to this if any user should Access such data or information it will
automatically logging or Authentication to JARs [4].
--------------------------------------------------------------------------***------------------------------------------------------------------------------
1.INTRODUCTION
The Cloud Information Accountability (CIA) is consisting of
Automated logging mechanism. It has categories two measure
part: Logger and log harmonizer [3].
JAR files consist of the collection of the different rules in
which different Authorization of Access should take place.
Each separate logging should carry out through integrity
checks. Created files are contain “Reed-Solomon-Based
encoder” [4].
Creation of JARs - In the creation of JARs, when any user
uploads their file, at that time JARs file is created
automatically. JARs consist of one or more collection of JARs
file. So that it is important method for security purpose.log file
is consist of record of every JARs file [2]. Whenever any
Technical problem cause or Damage log file, that log file are
Restored through the Recovery Mechanism.
Certificate Authority- Certificate Authority is check where
cloud server is Authorize or not [5].CA is providing the
certificate Authority. If any server is not recognizing with CA
(Certificate Authority), then this server is Duplicate or Fraud
server. Before uploading there data in the cloud, Data owner
should check that Particular Server are Recognize with CA or
not [6].
Logger- Cloud server is maintaining the logger. Logger is to
be consisting of detail about user and the data owner who can
Access the particular cloud server. Logger is playing the
important role, while accessing cloud server of particular user.
Also Logger should access the time and IP Address of data
who user should requested [3].
Existing system- In the technique of cloud computing, it
consist of Delivery to data from one resource to other machine
through the internet. Now a day‟s one server should handle the
Multiple Request of user. So that processing time will be
increases simultaneously. So that the management of the
database is not has trustworthy. Also web services are to be
used for the Request and Response [4].
2.LITERATURE SURVEY
Cloud server:-Cloud server means user can use all types of
data which is stored on the cloud server. Data owner can store
his data on the cloud server. When user need data at that time
user can send the request to the cloud server then cloud server
accept the user request and pass to the data owner .when data
owner accept the request of user then data owner search the
data related to the user request then pass this data to the user
throw the cloud server. The cloud server manages the
information [1]
Certificate authority:We need the certificate authority in the
cloud server for to confirm the cloud server again. When any
cloud server is not responding then that server is called as
fraud server. When data owner is stored on the cloud at that
time he checks the cloud server means cloud server is
confirming or not [2].
Jar availability:CIA contain log harmonizer to secure from
attacks on offline JARs. Log harmonizer used to stores error
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 569
correction information. It is also used to recover corrupted
logs. It is also used to Decrypt the log records & handle
duplicate records [5].
Logger:Cloud server is controlled to the logger. Loggers have
all information of the data owner and users who are operating
the Cloud Server. Logger will be used for user or data owner
which operate the cloud server at specific time [3].
3.PROPOSED SYSTEM
We have proposed the new Method know as cloud Information
Accountability. Totally Depends upon Information
Accountability. Information Accountability is consists of
secure transaction of data or file. In the information
Accountability Without proper Authentication no one user
should Access the particular server [1].One of the Advantage
of the (CIA) Cloud Information Accountability is it has Ability
to Maintain the low weight and powerful Accountability that
Access the control or Authentication. Whole workings are to
be done in the two Different modes known as: Push mode And
Pull mode [3].
Detail Security Analysis Mechanism Are also provided.
1. Let TS (NTP) be the network time protocol timestamp.
2. Pull=0
3. Rec :=( UID, ode, Access Type, Result, Time, loc)
4. Cur Time: =TS (NTP)
5. Size=size of (log)//current size of the log
6. if ((cutime-tbeg) <time) &&
(Size < size)&& (pull==0) then
7. Log: = log Encrypt (Rec)//encrypt is the encryption function
used to encrypt the record
8. PING to CJAR //send a PING to the harmonizer to check if
it is alive
9. If PING-CJAR then
10. PUSH RS (Rec) // write the error correcting bits
11. Else
12. EXIT (1)//error if no PING is received
13. End if
14. End if
15. If ((cut time – beg) > time) || (size >=size) ||(pull!=0) then
16.//Check if PING is received
17. If PING-CJAR is received
18. PUSH log//write the log file to the harmonizer
19. RS (log): = NULL // reset the error correction records
20. Beg: = TS (NTP) //reset the beg variable
21. Pull: = 0
22. Else
23. Exit (1) // error if no PING is received
24. End if
25. End if
4.EXPECTED RESULT
Experimental result: In the experiment we first upon create the
log file and measuring the total time overhead of the system.
we can Analyze that in the whole experiment total time
overhead is the „Authentication time‟, „After encryption of log
records‟ and‟ logs time combination‟[7].our Architectural
framework is light weight and the stored data are to be prove
by Actual file and logs.
Authentication Time: During the Authentication of cusp, next
point overhead should occur, but time duration of complete
this authentication is so long [6].when any action required by
JAR, the time taken for the authentication and user end is
same.
Time Taken to Perform Logging: This is the main side of
experiment .in which we have studies the effect of long file
size or logging mechanism performance. We have also
measured the average time, that should used to Access
particular log record [4].the time for the execution is low due
to the every access view the request. When action is about 10
sec then average time is so long or high.
5.CONCLUSION
We have introduced the new method or approach for the
automatically logging mechanism. Logging mechanism is to
provide the strong security of the server over the cloud. Also
we have use the CIA which can help to support the
Authentication mechanism. JARs file is the main aspect of the
experiment. We have to increase the total speed of the file
transmission in the low time over the cloud server.
REFERENCES
[1] Cloud Computing, Principles and Paradigms by John
Wiley & Sons.
[2] Ensuring Distributed Accountability for Data Sharing
in the Cloud Author, Smitha Sundareswaran, Anna
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 570
C.Squicciarini, Member, IEEE, and Dan Lin, IEEE
Transactions on Dependable and Secure Computing
VOL 9, NO,4 July/August 2012 .
[3] S. Pearson and A. Charlesworth, "Accountability as a
Way Forward for Privacy Protection in the Cloud,”
Proc First Int'l conf. Cloud Computing, 2009.
[4]”Reed-Solomon Codes and Their Applications”, S.B.
Wicker and V.K. Bhargava, ed. John Wiley & Sons,
1999.
[5] Hsio Ying Lin,Tzeng.W.G, “A Secure Erasure Code-
Based Cloud Storage System with Secure Data
Forwarding “, IEEE transactions on parallel and
Distributed systems, 2012.
6] Y. Chen et al., “Oblivious Hashing: A Stealthy
Software Integrity Verification Primitive,” Proc. Int‟l
Workshop Information Hiding, F. Petitcolas, ed., pp.
400-414, 2003.
[7] D. Boneh and M.K. Franklin, “Identity-Based
Encryption from the Weil Pairing,” Proc. Int‟l Cryptology
Conf. Advances in Cryptology, pp. 213 229, 2001.

More Related Content

What's hot

SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding kadalisrikanth
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudPvrtechnologies Nellore
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion PacketsAmazon Web Services
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...ijtsrd
 
Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28Xavier Lucas
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudCloudTechnologies
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.prudhvikumar madithati
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationAdz91 Digital Ads Pvt Ltd
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
MongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and RiskSukbum Hong
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_awssaifam
 
AWS BaseCamp: AWS Architecture Fundamentals
AWS BaseCamp: AWS  Architecture FundamentalsAWS BaseCamp: AWS  Architecture Fundamentals
AWS BaseCamp: AWS Architecture FundamentalsNicole Maus
 

What's hot (19)

SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion Packets
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
 
Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28Openstack meetup lyon_2017-09-28
Openstack meetup lyon_2017-09-28
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
MongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded Transactions
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_aws
 
AWS BaseCamp: AWS Architecture Fundamentals
AWS BaseCamp: AWS  Architecture FundamentalsAWS BaseCamp: AWS  Architecture Fundamentals
AWS BaseCamp: AWS Architecture Fundamentals
 

Viewers also liked

Design study of stressed mirror polishing (smp) fixture
Design study of stressed mirror polishing (smp) fixtureDesign study of stressed mirror polishing (smp) fixture
Design study of stressed mirror polishing (smp) fixtureeSAT Journals
 
Damage control technology of oil-based drilling fluid for shale and tight san...
Damage control technology of oil-based drilling fluid for shale and tight san...Damage control technology of oil-based drilling fluid for shale and tight san...
Damage control technology of oil-based drilling fluid for shale and tight san...eSAT Journals
 
Experimental investigation on exhaust emissions with ceramic coated diesel en...
Experimental investigation on exhaust emissions with ceramic coated diesel en...Experimental investigation on exhaust emissions with ceramic coated diesel en...
Experimental investigation on exhaust emissions with ceramic coated diesel en...eSAT Journals
 
Automatic headlight dimmer a prototype for vehicles
Automatic headlight dimmer a prototype for vehiclesAutomatic headlight dimmer a prototype for vehicles
Automatic headlight dimmer a prototype for vehicleseSAT Journals
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Journals
 
Fault identification in transformer winding
Fault identification in transformer windingFault identification in transformer winding
Fault identification in transformer windingeSAT Journals
 
An overview study of working condition and productivity of construction labou...
An overview study of working condition and productivity of construction labou...An overview study of working condition and productivity of construction labou...
An overview study of working condition and productivity of construction labou...eSAT Journals
 
Use of non metallic e-waste as a coarse aggregate in a concrete
Use of non metallic e-waste as a coarse aggregate in a concreteUse of non metallic e-waste as a coarse aggregate in a concrete
Use of non metallic e-waste as a coarse aggregate in a concreteeSAT Journals
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels eSAT Journals
 
Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...eSAT Journals
 
Experimental study on effect of slot level on local scour around bridge pier
Experimental study on effect of slot level on local scour around bridge pierExperimental study on effect of slot level on local scour around bridge pier
Experimental study on effect of slot level on local scour around bridge piereSAT Journals
 
Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...eSAT Journals
 
The simulation research of reciprocating dividing shear knife based on adams
The simulation research of reciprocating dividing shear knife based on adamsThe simulation research of reciprocating dividing shear knife based on adams
The simulation research of reciprocating dividing shear knife based on adamseSAT Journals
 
Experimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete memberExperimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete membereSAT Journals
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallseSAT Journals
 
A review on jute geotextile – part 1
A review on jute geotextile – part 1A review on jute geotextile – part 1
A review on jute geotextile – part 1eSAT Journals
 
Computation of stress intensity factor of brass plate with edge crack using j...
Computation of stress intensity factor of brass plate with edge crack using j...Computation of stress intensity factor of brass plate with edge crack using j...
Computation of stress intensity factor of brass plate with edge crack using j...eSAT Journals
 
Transient stability analysis on a multi machine system in psat
Transient stability analysis on a multi machine system in psatTransient stability analysis on a multi machine system in psat
Transient stability analysis on a multi machine system in psateSAT Journals
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Journals
 

Viewers also liked (19)

Design study of stressed mirror polishing (smp) fixture
Design study of stressed mirror polishing (smp) fixtureDesign study of stressed mirror polishing (smp) fixture
Design study of stressed mirror polishing (smp) fixture
 
Damage control technology of oil-based drilling fluid for shale and tight san...
Damage control technology of oil-based drilling fluid for shale and tight san...Damage control technology of oil-based drilling fluid for shale and tight san...
Damage control technology of oil-based drilling fluid for shale and tight san...
 
Experimental investigation on exhaust emissions with ceramic coated diesel en...
Experimental investigation on exhaust emissions with ceramic coated diesel en...Experimental investigation on exhaust emissions with ceramic coated diesel en...
Experimental investigation on exhaust emissions with ceramic coated diesel en...
 
Automatic headlight dimmer a prototype for vehicles
Automatic headlight dimmer a prototype for vehiclesAutomatic headlight dimmer a prototype for vehicles
Automatic headlight dimmer a prototype for vehicles
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Fault identification in transformer winding
Fault identification in transformer windingFault identification in transformer winding
Fault identification in transformer winding
 
An overview study of working condition and productivity of construction labou...
An overview study of working condition and productivity of construction labou...An overview study of working condition and productivity of construction labou...
An overview study of working condition and productivity of construction labou...
 
Use of non metallic e-waste as a coarse aggregate in a concrete
Use of non metallic e-waste as a coarse aggregate in a concreteUse of non metallic e-waste as a coarse aggregate in a concrete
Use of non metallic e-waste as a coarse aggregate in a concrete
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels
 
Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...
 
Experimental study on effect of slot level on local scour around bridge pier
Experimental study on effect of slot level on local scour around bridge pierExperimental study on effect of slot level on local scour around bridge pier
Experimental study on effect of slot level on local scour around bridge pier
 
Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...
 
The simulation research of reciprocating dividing shear knife based on adams
The simulation research of reciprocating dividing shear knife based on adamsThe simulation research of reciprocating dividing shear knife based on adams
The simulation research of reciprocating dividing shear knife based on adams
 
Experimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete memberExperimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete member
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
 
A review on jute geotextile – part 1
A review on jute geotextile – part 1A review on jute geotextile – part 1
A review on jute geotextile – part 1
 
Computation of stress intensity factor of brass plate with edge crack using j...
Computation of stress intensity factor of brass plate with edge crack using j...Computation of stress intensity factor of brass plate with edge crack using j...
Computation of stress intensity factor of brass plate with edge crack using j...
 
Transient stability analysis on a multi machine system in psat
Transient stability analysis on a multi machine system in psatTransient stability analysis on a multi machine system in psat
Transient stability analysis on a multi machine system in psat
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...
 

Similar to Ensuring distributed accountability for data sharing in the cloud

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudeSAT Publishing House
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Editor IJCATR
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 

Similar to Ensuring distributed accountability for data sharing in the cloud (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16
 
L01246974
L01246974L01246974
L01246974
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUankushspencer015
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.benjamincojr
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological universityMohd Saifudeen
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfssuser5c9d4b1
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 

Recently uploaded (20)

Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 

Ensuring distributed accountability for data sharing in the cloud

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 568 ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD D. J. Bonde, Mahesh Zite, Sachin Hol, Sandip Shinde, Yogesh Wagh Abstract Cloud computing is present a new Technology to Share Data or IT Based Service over the internet. Cloud Service provider are basically used to handle data to the unknown type of resources [1].for sharing of data over the cloud also used more entities. Those entities are relevant with each other in the cloud. Also cloud computing technology is provided a approach of Dynamic data handling .But overcome to this method sharing of data over the cloud is complex process. So that for the solution of this we are use the new framework know as (CIA)Cloud Information Accountability[3].In the cloud Information Accountability, if any user are subscribe this type of service, then service provider should provide the Access control or rights. By using the Mechanism of Access control whole information will be stored in the service provider.CIA also consists of two measure part logger and log harmonizer. JARs are used to create the Dynamic object. Ensure to this if any user should Access such data or information it will automatically logging or Authentication to JARs [4]. --------------------------------------------------------------------------***------------------------------------------------------------------------------ 1.INTRODUCTION The Cloud Information Accountability (CIA) is consisting of Automated logging mechanism. It has categories two measure part: Logger and log harmonizer [3]. JAR files consist of the collection of the different rules in which different Authorization of Access should take place. Each separate logging should carry out through integrity checks. Created files are contain “Reed-Solomon-Based encoder” [4]. Creation of JARs - In the creation of JARs, when any user uploads their file, at that time JARs file is created automatically. JARs consist of one or more collection of JARs file. So that it is important method for security purpose.log file is consist of record of every JARs file [2]. Whenever any Technical problem cause or Damage log file, that log file are Restored through the Recovery Mechanism. Certificate Authority- Certificate Authority is check where cloud server is Authorize or not [5].CA is providing the certificate Authority. If any server is not recognizing with CA (Certificate Authority), then this server is Duplicate or Fraud server. Before uploading there data in the cloud, Data owner should check that Particular Server are Recognize with CA or not [6]. Logger- Cloud server is maintaining the logger. Logger is to be consisting of detail about user and the data owner who can Access the particular cloud server. Logger is playing the important role, while accessing cloud server of particular user. Also Logger should access the time and IP Address of data who user should requested [3]. Existing system- In the technique of cloud computing, it consist of Delivery to data from one resource to other machine through the internet. Now a day‟s one server should handle the Multiple Request of user. So that processing time will be increases simultaneously. So that the management of the database is not has trustworthy. Also web services are to be used for the Request and Response [4]. 2.LITERATURE SURVEY Cloud server:-Cloud server means user can use all types of data which is stored on the cloud server. Data owner can store his data on the cloud server. When user need data at that time user can send the request to the cloud server then cloud server accept the user request and pass to the data owner .when data owner accept the request of user then data owner search the data related to the user request then pass this data to the user throw the cloud server. The cloud server manages the information [1] Certificate authority:We need the certificate authority in the cloud server for to confirm the cloud server again. When any cloud server is not responding then that server is called as fraud server. When data owner is stored on the cloud at that time he checks the cloud server means cloud server is confirming or not [2]. Jar availability:CIA contain log harmonizer to secure from attacks on offline JARs. Log harmonizer used to stores error
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 569 correction information. It is also used to recover corrupted logs. It is also used to Decrypt the log records & handle duplicate records [5]. Logger:Cloud server is controlled to the logger. Loggers have all information of the data owner and users who are operating the Cloud Server. Logger will be used for user or data owner which operate the cloud server at specific time [3]. 3.PROPOSED SYSTEM We have proposed the new Method know as cloud Information Accountability. Totally Depends upon Information Accountability. Information Accountability is consists of secure transaction of data or file. In the information Accountability Without proper Authentication no one user should Access the particular server [1].One of the Advantage of the (CIA) Cloud Information Accountability is it has Ability to Maintain the low weight and powerful Accountability that Access the control or Authentication. Whole workings are to be done in the two Different modes known as: Push mode And Pull mode [3]. Detail Security Analysis Mechanism Are also provided. 1. Let TS (NTP) be the network time protocol timestamp. 2. Pull=0 3. Rec :=( UID, ode, Access Type, Result, Time, loc) 4. Cur Time: =TS (NTP) 5. Size=size of (log)//current size of the log 6. if ((cutime-tbeg) <time) && (Size < size)&& (pull==0) then 7. Log: = log Encrypt (Rec)//encrypt is the encryption function used to encrypt the record 8. PING to CJAR //send a PING to the harmonizer to check if it is alive 9. If PING-CJAR then 10. PUSH RS (Rec) // write the error correcting bits 11. Else 12. EXIT (1)//error if no PING is received 13. End if 14. End if 15. If ((cut time – beg) > time) || (size >=size) ||(pull!=0) then 16.//Check if PING is received 17. If PING-CJAR is received 18. PUSH log//write the log file to the harmonizer 19. RS (log): = NULL // reset the error correction records 20. Beg: = TS (NTP) //reset the beg variable 21. Pull: = 0 22. Else 23. Exit (1) // error if no PING is received 24. End if 25. End if 4.EXPECTED RESULT Experimental result: In the experiment we first upon create the log file and measuring the total time overhead of the system. we can Analyze that in the whole experiment total time overhead is the „Authentication time‟, „After encryption of log records‟ and‟ logs time combination‟[7].our Architectural framework is light weight and the stored data are to be prove by Actual file and logs. Authentication Time: During the Authentication of cusp, next point overhead should occur, but time duration of complete this authentication is so long [6].when any action required by JAR, the time taken for the authentication and user end is same. Time Taken to Perform Logging: This is the main side of experiment .in which we have studies the effect of long file size or logging mechanism performance. We have also measured the average time, that should used to Access particular log record [4].the time for the execution is low due to the every access view the request. When action is about 10 sec then average time is so long or high. 5.CONCLUSION We have introduced the new method or approach for the automatically logging mechanism. Logging mechanism is to provide the strong security of the server over the cloud. Also we have use the CIA which can help to support the Authentication mechanism. JARs file is the main aspect of the experiment. We have to increase the total speed of the file transmission in the low time over the cloud server. REFERENCES [1] Cloud Computing, Principles and Paradigms by John Wiley & Sons. [2] Ensuring Distributed Accountability for Data Sharing in the Cloud Author, Smitha Sundareswaran, Anna
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 570 C.Squicciarini, Member, IEEE, and Dan Lin, IEEE Transactions on Dependable and Secure Computing VOL 9, NO,4 July/August 2012 . [3] S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud,” Proc First Int'l conf. Cloud Computing, 2009. [4]”Reed-Solomon Codes and Their Applications”, S.B. Wicker and V.K. Bhargava, ed. John Wiley & Sons, 1999. [5] Hsio Ying Lin,Tzeng.W.G, “A Secure Erasure Code- Based Cloud Storage System with Secure Data Forwarding “, IEEE transactions on parallel and Distributed systems, 2012. 6] Y. Chen et al., “Oblivious Hashing: A Stealthy Software Integrity Verification Primitive,” Proc. Int‟l Workshop Information Hiding, F. Petitcolas, ed., pp. 400-414, 2003. [7] D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int‟l Cryptology Conf. Advances in Cryptology, pp. 213 229, 2001.