SlideShare a Scribd company logo
1 of 16
IINNTTRROODDUUCCTTIIOONN:: 
 CLOUD computing presents a new way to supplement the current 
consumption and delivery model for IT services based on the 
Internet. 
 While enjoying the convenience brought by this new technology, 
users also start worrying about losing control of their own data. 
 In the context of cloud, accountability is a set of approaches to 
addresses two key problems: 
 Lack of consumer trust in cloud service providers 
 Difficulty faced by cloud service providers with compliance 
across geographic boundaries 
 Emphasis is on data protection, but the notion of accountability 
encompasses more than just privacy
AABBSSTTRRAACCTT:: 
 Though the Cloud Service Provider (CSP) gives the privacy and 
integrity of the data, this tracks the actual usage of the user’s data 
in the cloud by using novel highly decentralized framework data 
and policies 
 An object-centered approach that enables enclosing our logging 
mechanism together with users’ data and policies. 
 By leverageing the JAR programmable capabilities to both create a 
dynamic and traveling object. 
 To strengthen user’s control, also provide distributed auditing 
mechanisms.
EEXXIISSTTIINNGG SSYYSSTTEEMM:: 
 Data handling can be outsourced by the direct cloud service 
provider (CSP) to other entities in the cloud and theses entities can 
also delegate the tasks to others, and so on. 
 Entities are allowed to join and leave the cloud in a flexible manner. 
As a result, data handling in the cloud goes through a complex and 
dynamic hierarchical service chain which does not exist in 
conventional environments 
 No log and JAR files created for this system 
 Data in the cloud may be of encrypted form
PPRROOPPOOSSEEDD SSYYSSTTEEMM:: 
 As the cloud provider gives the access of the resources to the 
cloud user’s, the data owner keeps track of usage of their 
resources. 
 It also provides authenticated usage of data in the cloud. 
 Proposed CIA framework provides end-to end accountability in a 
highly distributed fashion.. 
 By means of the CIA, data owners can track not only whether or 
not the service-level agreements.
Advantage Of Proposed System: 
 Novel automatic and enforceable logging mechanism in the cloud. 
 Proposed architecture is platform independent and highly 
decentralized, in that it does not require any dedicated 
authentication or storage system in place. 
 Provide a certain degree of usage control for the protected data 
after these are delivered to the receiver 
 The results demonstrate the efficiency, scalability, and granularity 
of our approach. We also provide a detailed security analysis and 
discuss the reliability and strength of our architecture.
Literature Survey 
1.Toward Publicly Auditable Secure Cloud Data Storage 
Services 
The authors propose that publicly auditable cloud data storage is 
able to help this nascent cloud economy become fully established. 
With public auditability, a trusted entity with expertise and 
capabilities data owners do not possess can be delegated as an 
external audit party to assess the risk of outsourced data when 
needed. 
 Such an auditing service not only helps save data owners’ 
computation resources but also provides a transparent yet cost-effective 
method for data owners to gain trust in the cloud. The 
author describe approaches and system requirements that should 
be brought into consideration, and outline challenges that need to 
be resolved for such a publicly auditable secure cloud storage 
service to become a reality
2.Identity-Based Authentication for Cloud Computing 
The authors propose an identity-based encryption (IBE) and 
decryption and identity-based signature (IBS) schemes for 
IBHMCC. based on the former IBE and IBS schemes, an 
identitybased authentication for cloud computing (IBACC) is 
proposed.The author presented an identity based authentication 
for cloudcomputing, based on the identity-based hierarchical 
model for cloud computing (IBHMCC) and corresponding 
encryption and signature schemes 
3.Online data storage using implicit security 
The authors have described an implicit security architecture 
suited for the application of online storage. In this scheme data is 
partitioned in such a way that each partition is implicitly secure and 
does not need to be encrypted. These partitions are stored on 
different servers on the network which are known only to the 
user. Reconstruction of the data requires access to each server 
and the knowledge as to which servers the data partitions are 
stored..
HHAARRDDWWAARREE RREEQQUUIIRREEMMEENNTTSS:: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SSOOFFTTWWAARREE RREEQQUUIIRREEMMEENNTTSS:: 
 Operating System : Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp 
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : Mysql 5.0 
 Database Connectivity : JDBC.
AARRCCHHIITTEECCTTUURREE DDIIAAGGRRAAMM::
MMOODDUULLEESS:: 
1. Cloud Information Accountability (CIA) Framework 
2. Distinct mode for auditing: 
3. Logging and auditing Techniques . 
4. Components of CIA
MMOODDUULLEESS:: 
1. Cloud Information Accountability (CIA) 
Framework: 
 CIA framework lies in its ability of maintaining lightweight and 
powerful accountability. 
 By means of the CIA, data owners can track not only whether or 
not the service-level agreements are being honored, but also 
enforce access and usage control rules as needed.
2. Distinct mode for auditing: 
Push mode: 
 The push mode refers to logs being periodically sent to the data 
owner or stakeholder. 
Pull mode: 
 Pull mode refers to an alternative approach whereby the user 
 (Or another authorized party) can retrieve the logs as needed.
3. Logging and auditing Techniques: 
1. The logging should be decentralized in order to adapt to the 
dynamic nature of the cloud.. 
2. Every access to the user’s data should be correctly and 
automatically logged. 
3. Log files should be reliable and tamper proof to avoid illegal 
insertion, deletion, and modification by malicious parties. 
4. Log files should be sent back to their data owners periodically to 
inform them of the current usage of their data. 
5. The proposed technique should not intrusively monitor data 
recipients’ systems.
4. Major components of CIA: 
 There are two major components of the CIA, the first being the 
logger, and the second being the log harmonizer. 
 The logger is strongly coupled with user’s data (either single or 
multiple data items). 
 It may also be configured to ensure that access and usage control 
policies associated with the data are honored.
CCOONNCCLLUUSSIIOONN 
 Innovative approaches for automatically logging any access to the 
data in the cloud together with an auditing mechanism is proposed. 
 Approach allows the data owner to not only audit his content but 
also enforce strong back-end protection if needed. Moreover, one 
of the main features of our work is that it enables the data owner 
to audit even those copies of its data that were made without his 
knowledge. 
 In the future, planed to refine our approach to verify the integrity 
and the authentication of JARs
Thank You!

More Related Content

Viewers also liked

Content Marketing Strategy Attracts New Business
Content Marketing Strategy Attracts New BusinessContent Marketing Strategy Attracts New Business
Content Marketing Strategy Attracts New BusinessSRIMedia
 
Senior account executive
Senior account executiveSenior account executive
Senior account executivevivianboyack
 
Presentasi alk (analisis perkreditan)
Presentasi alk (analisis perkreditan)Presentasi alk (analisis perkreditan)
Presentasi alk (analisis perkreditan)Fikri Akmal Harrata
 
Pr account executive
Pr account executivePr account executive
Pr account executivevivianboyack
 
Apparatus familiarization
Apparatus familiarizationApparatus familiarization
Apparatus familiarizationWylieFireRescue
 
Blitzfire personal portable monitor powerpoint
Blitzfire personal portable monitor powerpointBlitzfire personal portable monitor powerpoint
Blitzfire personal portable monitor powerpointWylieFireRescue
 
American la france aerialoperationwylie, tx #0602973
American la france aerialoperationwylie, tx #0602973American la france aerialoperationwylie, tx #0602973
American la france aerialoperationwylie, tx #0602973WylieFireRescue
 
Driving out Fear
Driving out FearDriving out Fear
Driving out Fearfbjsinfo
 
Inspection & Maintenance
Inspection & MaintenanceInspection & Maintenance
Inspection & MaintenanceWylieFireRescue
 
Mobile Study Part 1 slide
Mobile Study Part 1 slideMobile Study Part 1 slide
Mobile Study Part 1 sliderschoenh
 
Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...
Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...
Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...Decor & Design - Waterproofing Contractors
 
Surgery in open angle glaucoma
Surgery in open angle  glaucoma Surgery in open angle  glaucoma
Surgery in open angle glaucoma aditisingh77985
 

Viewers also liked (20)

Content Marketing Strategy Attracts New Business
Content Marketing Strategy Attracts New BusinessContent Marketing Strategy Attracts New Business
Content Marketing Strategy Attracts New Business
 
Pptx present
Pptx presentPptx present
Pptx present
 
Senior account executive
Senior account executiveSenior account executive
Senior account executive
 
Model untuk manajemen
Model untuk manajemenModel untuk manajemen
Model untuk manajemen
 
Model untuk investor
Model untuk investorModel untuk investor
Model untuk investor
 
Presentasi alk (analisis perkreditan)
Presentasi alk (analisis perkreditan)Presentasi alk (analisis perkreditan)
Presentasi alk (analisis perkreditan)
 
Model untuk kreditur
Model untuk krediturModel untuk kreditur
Model untuk kreditur
 
Pr account executive
Pr account executivePr account executive
Pr account executive
 
Vehicle maintenance
Vehicle maintenanceVehicle maintenance
Vehicle maintenance
 
Apparatus familiarization
Apparatus familiarizationApparatus familiarization
Apparatus familiarization
 
Blitzfire personal portable monitor powerpoint
Blitzfire personal portable monitor powerpointBlitzfire personal portable monitor powerpoint
Blitzfire personal portable monitor powerpoint
 
American la france aerialoperationwylie, tx #0602973
American la france aerialoperationwylie, tx #0602973American la france aerialoperationwylie, tx #0602973
American la france aerialoperationwylie, tx #0602973
 
Texas cafs school ii
Texas cafs  school iiTexas cafs  school ii
Texas cafs school ii
 
Mdc training
Mdc trainingMdc training
Mdc training
 
Driving out Fear
Driving out FearDriving out Fear
Driving out Fear
 
Obiee introductionbuildingreports
Obiee introductionbuildingreportsObiee introductionbuildingreports
Obiee introductionbuildingreports
 
Inspection & Maintenance
Inspection & MaintenanceInspection & Maintenance
Inspection & Maintenance
 
Mobile Study Part 1 slide
Mobile Study Part 1 slideMobile Study Part 1 slide
Mobile Study Part 1 slide
 
Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...
Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...
Decor & design – Waterproofing Contractors for Basements, Roof / Terrace and ...
 
Surgery in open angle glaucoma
Surgery in open angle  glaucoma Surgery in open angle  glaucoma
Surgery in open angle glaucoma
 

Similar to Pp1t (20)

Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Test
TestTest
Test
 
Test
TestTest
Test
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 

Recently uploaded

定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一fhhkjh
 
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样gfghbihg
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERunosafeads
 
Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...
Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...
Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...kexey39068
 
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一fjjwgk
 
Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technologyquickpartslimitlessm
 
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607dollysharma2066
 
BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024AHOhOops1
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxDineshKumar4165
 
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证jjrehjwj11gg
 
2024 TOP 10 most fuel-efficient vehicles according to the US agency
2024 TOP 10 most fuel-efficient vehicles according to the US agency2024 TOP 10 most fuel-efficient vehicles according to the US agency
2024 TOP 10 most fuel-efficient vehicles according to the US agencyHyundai Motor Group
 
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESUNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESDineshKumar4165
 
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样gfghbihg
 
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full NightCall Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Nightssuser7cb4ff
 
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Digamma / CertiCon Company Presentation
Digamma / CertiCon Company  PresentationDigamma / CertiCon Company  Presentation
Digamma / CertiCon Company PresentationMihajloManjak
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一meq5nzfnk
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHot Call Girls In Sector 58 (Noida)
 

Recently uploaded (20)

定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
 
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
 
Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...
Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...
Call Girl Service Global Village Dubai +971509430017 Independent Call Girls G...
 
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
 
Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technology
 
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
 
BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024
 
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
 
Hot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort Service
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
 
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
 
2024 TOP 10 most fuel-efficient vehicles according to the US agency
2024 TOP 10 most fuel-efficient vehicles according to the US agency2024 TOP 10 most fuel-efficient vehicles according to the US agency
2024 TOP 10 most fuel-efficient vehicles according to the US agency
 
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESUNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
 
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
 
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full NightCall Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
 
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Digamma / CertiCon Company Presentation
Digamma / CertiCon Company  PresentationDigamma / CertiCon Company  Presentation
Digamma / CertiCon Company Presentation
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
 

Pp1t

  • 1. IINNTTRROODDUUCCTTIIOONN::  CLOUD computing presents a new way to supplement the current consumption and delivery model for IT services based on the Internet.  While enjoying the convenience brought by this new technology, users also start worrying about losing control of their own data.  In the context of cloud, accountability is a set of approaches to addresses two key problems:  Lack of consumer trust in cloud service providers  Difficulty faced by cloud service providers with compliance across geographic boundaries  Emphasis is on data protection, but the notion of accountability encompasses more than just privacy
  • 2. AABBSSTTRRAACCTT::  Though the Cloud Service Provider (CSP) gives the privacy and integrity of the data, this tracks the actual usage of the user’s data in the cloud by using novel highly decentralized framework data and policies  An object-centered approach that enables enclosing our logging mechanism together with users’ data and policies.  By leverageing the JAR programmable capabilities to both create a dynamic and traveling object.  To strengthen user’s control, also provide distributed auditing mechanisms.
  • 3. EEXXIISSTTIINNGG SSYYSSTTEEMM::  Data handling can be outsourced by the direct cloud service provider (CSP) to other entities in the cloud and theses entities can also delegate the tasks to others, and so on.  Entities are allowed to join and leave the cloud in a flexible manner. As a result, data handling in the cloud goes through a complex and dynamic hierarchical service chain which does not exist in conventional environments  No log and JAR files created for this system  Data in the cloud may be of encrypted form
  • 4. PPRROOPPOOSSEEDD SSYYSSTTEEMM::  As the cloud provider gives the access of the resources to the cloud user’s, the data owner keeps track of usage of their resources.  It also provides authenticated usage of data in the cloud.  Proposed CIA framework provides end-to end accountability in a highly distributed fashion..  By means of the CIA, data owners can track not only whether or not the service-level agreements.
  • 5. Advantage Of Proposed System:  Novel automatic and enforceable logging mechanism in the cloud.  Proposed architecture is platform independent and highly decentralized, in that it does not require any dedicated authentication or storage system in place.  Provide a certain degree of usage control for the protected data after these are delivered to the receiver  The results demonstrate the efficiency, scalability, and granularity of our approach. We also provide a detailed security analysis and discuss the reliability and strength of our architecture.
  • 6. Literature Survey 1.Toward Publicly Auditable Secure Cloud Data Storage Services The authors propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established. With public auditability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed.  Such an auditing service not only helps save data owners’ computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. The author describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality
  • 7. 2.Identity-Based Authentication for Cloud Computing The authors propose an identity-based encryption (IBE) and decryption and identity-based signature (IBS) schemes for IBHMCC. based on the former IBE and IBS schemes, an identitybased authentication for cloud computing (IBACC) is proposed.The author presented an identity based authentication for cloudcomputing, based on the identity-based hierarchical model for cloud computing (IBHMCC) and corresponding encryption and signature schemes 3.Online data storage using implicit security The authors have described an implicit security architecture suited for the application of online storage. In this scheme data is partitioned in such a way that each partition is implicitly secure and does not need to be encrypted. These partitions are stored on different servers on the network which are known only to the user. Reconstruction of the data requires access to each server and the knowledge as to which servers the data partitions are stored..
  • 8. HHAARRDDWWAARREE RREEQQUUIIRREEMMEENNTTSS::  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Mouse : Logitech.  Ram : 512 Mb. SSOOFFTTWWAARREE RREEQQUUIIRREEMMEENNTTSS::  Operating System : Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0  Database Connectivity : JDBC.
  • 10. MMOODDUULLEESS:: 1. Cloud Information Accountability (CIA) Framework 2. Distinct mode for auditing: 3. Logging and auditing Techniques . 4. Components of CIA
  • 11. MMOODDUULLEESS:: 1. Cloud Information Accountability (CIA) Framework:  CIA framework lies in its ability of maintaining lightweight and powerful accountability.  By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed.
  • 12. 2. Distinct mode for auditing: Push mode:  The push mode refers to logs being periodically sent to the data owner or stakeholder. Pull mode:  Pull mode refers to an alternative approach whereby the user  (Or another authorized party) can retrieve the logs as needed.
  • 13. 3. Logging and auditing Techniques: 1. The logging should be decentralized in order to adapt to the dynamic nature of the cloud.. 2. Every access to the user’s data should be correctly and automatically logged. 3. Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and modification by malicious parties. 4. Log files should be sent back to their data owners periodically to inform them of the current usage of their data. 5. The proposed technique should not intrusively monitor data recipients’ systems.
  • 14. 4. Major components of CIA:  There are two major components of the CIA, the first being the logger, and the second being the log harmonizer.  The logger is strongly coupled with user’s data (either single or multiple data items).  It may also be configured to ensure that access and usage control policies associated with the data are honored.
  • 15. CCOONNCCLLUUSSIIOONN  Innovative approaches for automatically logging any access to the data in the cloud together with an auditing mechanism is proposed.  Approach allows the data owner to not only audit his content but also enforce strong back-end protection if needed. Moreover, one of the main features of our work is that it enables the data owner to audit even those copies of its data that were made without his knowledge.  In the future, planed to refine our approach to verify the integrity and the authentication of JARs