SlideShare a Scribd company logo
INTRODUCTION:
 CLOUD computing presents a new way to supplement the
current consumption and delivery model for IT services based
on the Internet.
 While enjoying the convenience brought by this new
technology, users also start worrying about losing control of
their own data.
 In the context of cloud, accountability is a set of approaches
to addresses two key problems:
 Lack of consumer trust in cloud service providers
 Difficulty faced by cloud service providers with compliance
across geographic boundaries
 Emphasis is on data protection, but the notion of
accountability encompasses more than just privacy
ABSTRACT:
 Though the Cloud Service Provider (CSP) gives the privacy
and integrity of the data, this tracks the actual usage of the
user’s data in the cloud by using novel highly decentralized
framework data and policies
 An object-centered approach that enables enclosing our
logging mechanism together with users’ data and policies.
 By leverageing the JAR programmable capabilities to both
create a dynamic and traveling object.
 To strengthen user’s control, also provide distributed auditing
mechanisms.
EXISTING SYSTEM:
 Data handling can be outsourced by the direct cloud service
provider (CSP) to other entities in the cloud and theses entities
can also delegate the tasks to others, and so on.
 Entities are allowed to join and leave the cloud in a flexible
manner. As a result, data handling in the cloud goes through a
complex and dynamic hierarchical service chain which does not
exist in conventional environments
 No log and JAR files created for this system
 Data in the cloud may be of encrypted form
PROPOSED SYSTEM:
 As the cloud provider gives the access of the resources to the
cloud user’s, the data owner keeps track of usage of their
resources.
 It also provides authenticated usage of data in the cloud.
 Proposed CIA framework provides end-to end accountability
in a highly distributed fashion..
 By means of the CIA, data owners can track not only whether
or not the service-level agreements.
Advantage Of Proposed System:
 Novel automatic and enforceable logging mechanism in the
cloud.
 Proposed architecture is platform independent and highly
decentralized, in that it does not require any dedicated
authentication or storage system in place.
 Provide a certain degree of usage control for the protected
data after these are delivered to the receiver
 The results demonstrate the efficiency, scalability, and
granularity of our approach. We also provide a detailed
security analysis and discuss the reliability and strength of
our architecture.
Literature Survey
1.Toward Publicly Auditable Secure Cloud Data Storage
Services
The authors propose that publicly auditable cloud data
storage is able to help this nascent cloud economy become
fully established. With public auditability, a trusted entity with
expertise and capabilities data owners do not possess can be
delegated as an external audit party to assess the risk of
outsourced data when needed.
 Such an auditing service not only helps save data owners’
computation resources but also provides a transparent yet
cost-effective method for data owners to gain trust in the
cloud. The author describe approaches and system
requirements that should be brought into consideration, and
outline challenges that need to be resolved for such a publicly
auditable secure cloud storage service to become a reality
2.Identity-Based Authentication for Cloud Computing
The authors propose an identity-based encryption (IBE) and
decryption and identity-based signature (IBS) schemes for
IBHMCC. based on the former IBE and IBS schemes, an
identitybased authentication for cloud computing (IBACC) is
proposed.The author presented an identity based
authentication for cloudcomputing, based on the identity-
based hierarchical model for cloud computing (IBHMCC) and
corresponding encryption and signature schemes
3.Online data storage using implicit security
The authors have described an implicit security architecture
suited for the application of online storage. In this scheme
data is partitioned in such a way that each partition is
implicitly secure and does not need to be encrypted. These
partitions are stored on different servers on the network which
are known only to the user. Reconstruction of the data
requires access to each server and the knowledge as to
which servers the data partitions are stored..
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating System : Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
 Database Connectivity : JDBC.
ARCHITECTURE DIAGRAM:
MODULES:
1. Cloud Information Accountability (CIA) Framework
2. Distinct mode for auditing:
3. Logging and auditing Techniques .
4. Components of CIA
MODULES:
1. Cloud Information Accountability (CIA)
Framework:
 CIA framework lies in its ability of maintaining lightweight and
powerful accountability.
 By means of the CIA, data owners can track not only whether
or not the service-level agreements are being honored, but
also enforce access and usage control rules as needed.
2. Distinct mode for auditing:
Push mode:
 The push mode refers to logs being periodically sent to the
data owner or stakeholder.
Pull mode:
 Pull mode refers to an alternative approach whereby the user
 (Or another authorized party) can retrieve the logs as needed.
3. Logging and auditing Techniques:
1. The logging should be decentralized in order to adapt to the
dynamic nature of the cloud..
2. Every access to the user’s data should be correctly and
automatically logged.
3. Log files should be reliable and tamper proof to avoid illegal
insertion, deletion, and modification by malicious parties.
4. Log files should be sent back to their data owners periodically
to inform them of the current usage of their data.
5. The proposed technique should not intrusively monitor data
recipients’ systems.
4. Major components of CIA:
 There are two major components of the CIA, the first being
the logger, and the second being the log harmonizer.
 The logger is strongly coupled with user’s data (either single
or multiple data items).
 It may also be configured to ensure that access and usage
control policies associated with the data are honored.
CONCLUSION
 Innovative approaches for automatically logging any access
to the data in the cloud together with an auditing mechanism
is proposed.
 Approach allows the data owner to not only audit his content
but also enforce strong back-end protection if needed.
Moreover, one of the main features of our work is that it
enables the data owner to audit even those copies of its data
that were made without his knowledge.
 In the future, planed to refine our approach to verify the
integrity and the authentication of JARs
Thank You!

More Related Content

Similar to 82ugszwcqn29itkwai2q 140424034504-phpapp01

Pp1t
Pp1tPp1t
pp1t
pp1tpp1t
Pp1t
Pp1tPp1t
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
Editor IJCATR
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
Chanakya Chandu
 
C04932125
C04932125C04932125
C04932125
IOSR-JEN
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IJERA Editor
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Nag Nani
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Shakas Technologies
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
IEEEGLOBALSOFTTECHNOLOGIES
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
 

Similar to 82ugszwcqn29itkwai2q 140424034504-phpapp01 (18)

Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
 
C04932125
C04932125C04932125
C04932125
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 

More from Nitish Bhardwaj

Doc document
Doc documentDoc document
Doc document
Nitish Bhardwaj
 
Pptx present
Pptx presentPptx present
Pptx present
Nitish Bhardwaj
 
Pdf docu
Pdf docuPdf docu
Pdf docu
Nitish Bhardwaj
 
Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)
Nitish Bhardwaj
 
Drive present
Drive presentDrive present
Drive present
Nitish Bhardwaj
 
Docx document
Docx documentDocx document
Docx document
Nitish Bhardwaj
 
Doc1x
Doc1xDoc1x
Doc document
Doc documentDoc document
Doc document
Nitish Bhardwaj
 
HAdoop presentation
HAdoop presentationHAdoop presentation
HAdoop presentation
Nitish Bhardwaj
 
Adaptivemagicbrekercmw2014 final-140901211811-phpapp01
Adaptivemagicbrekercmw2014 final-140901211811-phpapp01Adaptivemagicbrekercmw2014 final-140901211811-phpapp01
Adaptivemagicbrekercmw2014 final-140901211811-phpapp01
Nitish Bhardwaj
 
1
11
how
howhow
Check for it
Check for itCheck for it
Check for it
Nitish Bhardwaj
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
Nitish Bhardwaj
 
Moon
MoonMoon
Heisenberg
HeisenbergHeisenberg
Heisenberg
Nitish Bhardwaj
 
Frankunderwoodslessonsslideshare 140825070130-phpapp02
Frankunderwoodslessonsslideshare 140825070130-phpapp02Frankunderwoodslessonsslideshare 140825070130-phpapp02
Frankunderwoodslessonsslideshare 140825070130-phpapp02
Nitish Bhardwaj
 
Docx document
Docx documentDocx document
Docx document
Nitish Bhardwaj
 

More from Nitish Bhardwaj (20)

Doc document
Doc documentDoc document
Doc document
 
Pptx present
Pptx presentPptx present
Pptx present
 
Pdf info
Pdf infoPdf info
Pdf info
 
Pdf docu
Pdf docuPdf docu
Pdf docu
 
Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)Hadoop 130419075715-phpapp02(1)
Hadoop 130419075715-phpapp02(1)
 
Drive present
Drive presentDrive present
Drive present
 
Docx document
Docx documentDocx document
Docx document
 
Doc1x
Doc1xDoc1x
Doc1x
 
Doc document
Doc documentDoc document
Doc document
 
HAdoop presentation
HAdoop presentationHAdoop presentation
HAdoop presentation
 
Adaptivemagicbrekercmw2014 final-140901211811-phpapp01
Adaptivemagicbrekercmw2014 final-140901211811-phpapp01Adaptivemagicbrekercmw2014 final-140901211811-phpapp01
Adaptivemagicbrekercmw2014 final-140901211811-phpapp01
 
1
11
1
 
1
11
1
 
how
howhow
how
 
Check for it
Check for itCheck for it
Check for it
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Moon
MoonMoon
Moon
 
Heisenberg
HeisenbergHeisenberg
Heisenberg
 
Frankunderwoodslessonsslideshare 140825070130-phpapp02
Frankunderwoodslessonsslideshare 140825070130-phpapp02Frankunderwoodslessonsslideshare 140825070130-phpapp02
Frankunderwoodslessonsslideshare 140825070130-phpapp02
 
Docx document
Docx documentDocx document
Docx document
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

82ugszwcqn29itkwai2q 140424034504-phpapp01

  • 1. INTRODUCTION:  CLOUD computing presents a new way to supplement the current consumption and delivery model for IT services based on the Internet.  While enjoying the convenience brought by this new technology, users also start worrying about losing control of their own data.  In the context of cloud, accountability is a set of approaches to addresses two key problems:  Lack of consumer trust in cloud service providers  Difficulty faced by cloud service providers with compliance across geographic boundaries  Emphasis is on data protection, but the notion of accountability encompasses more than just privacy
  • 2. ABSTRACT:  Though the Cloud Service Provider (CSP) gives the privacy and integrity of the data, this tracks the actual usage of the user’s data in the cloud by using novel highly decentralized framework data and policies  An object-centered approach that enables enclosing our logging mechanism together with users’ data and policies.  By leverageing the JAR programmable capabilities to both create a dynamic and traveling object.  To strengthen user’s control, also provide distributed auditing mechanisms.
  • 3. EXISTING SYSTEM:  Data handling can be outsourced by the direct cloud service provider (CSP) to other entities in the cloud and theses entities can also delegate the tasks to others, and so on.  Entities are allowed to join and leave the cloud in a flexible manner. As a result, data handling in the cloud goes through a complex and dynamic hierarchical service chain which does not exist in conventional environments  No log and JAR files created for this system  Data in the cloud may be of encrypted form
  • 4. PROPOSED SYSTEM:  As the cloud provider gives the access of the resources to the cloud user’s, the data owner keeps track of usage of their resources.  It also provides authenticated usage of data in the cloud.  Proposed CIA framework provides end-to end accountability in a highly distributed fashion..  By means of the CIA, data owners can track not only whether or not the service-level agreements.
  • 5. Advantage Of Proposed System:  Novel automatic and enforceable logging mechanism in the cloud.  Proposed architecture is platform independent and highly decentralized, in that it does not require any dedicated authentication or storage system in place.  Provide a certain degree of usage control for the protected data after these are delivered to the receiver  The results demonstrate the efficiency, scalability, and granularity of our approach. We also provide a detailed security analysis and discuss the reliability and strength of our architecture.
  • 6. Literature Survey 1.Toward Publicly Auditable Secure Cloud Data Storage Services The authors propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established. With public auditability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed.  Such an auditing service not only helps save data owners’ computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. The author describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality
  • 7. 2.Identity-Based Authentication for Cloud Computing The authors propose an identity-based encryption (IBE) and decryption and identity-based signature (IBS) schemes for IBHMCC. based on the former IBE and IBS schemes, an identitybased authentication for cloud computing (IBACC) is proposed.The author presented an identity based authentication for cloudcomputing, based on the identity- based hierarchical model for cloud computing (IBHMCC) and corresponding encryption and signature schemes 3.Online data storage using implicit security The authors have described an implicit security architecture suited for the application of online storage. In this scheme data is partitioned in such a way that each partition is implicitly secure and does not need to be encrypted. These partitions are stored on different servers on the network which are known only to the user. Reconstruction of the data requires access to each server and the knowledge as to which servers the data partitions are stored..
  • 8. HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating System : Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0  Database Connectivity : JDBC.
  • 10. MODULES: 1. Cloud Information Accountability (CIA) Framework 2. Distinct mode for auditing: 3. Logging and auditing Techniques . 4. Components of CIA
  • 11. MODULES: 1. Cloud Information Accountability (CIA) Framework:  CIA framework lies in its ability of maintaining lightweight and powerful accountability.  By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed.
  • 12. 2. Distinct mode for auditing: Push mode:  The push mode refers to logs being periodically sent to the data owner or stakeholder. Pull mode:  Pull mode refers to an alternative approach whereby the user  (Or another authorized party) can retrieve the logs as needed.
  • 13. 3. Logging and auditing Techniques: 1. The logging should be decentralized in order to adapt to the dynamic nature of the cloud.. 2. Every access to the user’s data should be correctly and automatically logged. 3. Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and modification by malicious parties. 4. Log files should be sent back to their data owners periodically to inform them of the current usage of their data. 5. The proposed technique should not intrusively monitor data recipients’ systems.
  • 14. 4. Major components of CIA:  There are two major components of the CIA, the first being the logger, and the second being the log harmonizer.  The logger is strongly coupled with user’s data (either single or multiple data items).  It may also be configured to ensure that access and usage control policies associated with the data are honored.
  • 15. CONCLUSION  Innovative approaches for automatically logging any access to the data in the cloud together with an auditing mechanism is proposed.  Approach allows the data owner to not only audit his content but also enforce strong back-end protection if needed. Moreover, one of the main features of our work is that it enables the data owner to audit even those copies of its data that were made without his knowledge.  In the future, planed to refine our approach to verify the integrity and the authentication of JARs