Ensuring Distributed Accountability for
Data Sharing in the Cloud
Introduction
ļ‚— Cloud Computing
ļ‚— Features of Cloud Computing
1) Scalability
2)Resource Virtualization
Motivation
ļ‚— Client Fears of Loosing Control on Data.
ļ‚— Question about (Cloud Service
Provider)CSP reliability
ļ‚— Significant Barriers for Cloud Computing
Related Work
ļ‚— Information Accountability[1]
ļ‚— Accountability mechanisms and Privacy
Manager[2]
ļ‚— Logic for Auditing Accountability in
Decentralized Systems[3]
ļ‚— Accountable Grid Computing System[4]
Cont.
ļ‚— Security Applications in JAVA using Self-
Depending Objects[SDO][5]
ļ‚— Proof-Carrying authentication (PCA)[6]
ļ‚— Identity-Based Encryption[7]
ļ‚— Current access control mechanism[8]
Proposal
ļ‚— Decentralized Technique
ļ‚— Data Access automatic logging
ļ‚— Reliable Log files
ļ‚— Delivery of log files to Data Owner.
1)Push Mode
2)Pull Mode
Hardware Requirement
Two or more systems of following config.
ļ‚— Processor - Pentium IV onwards
ļ‚— RAM- 512 MB DD RAM
ļ‚— Hard Disk- 20 GB
System Architecture
Software Requirements
ļ‚— Operating System :Windows95/98/2000/XP
ļ‚— Application Server : Tomcat5.0/6.X
ļ‚— Front End : HTML, Java
 Server Sidé Script : Java Server Pages.
ļ‚— Database : MySQL 5.0
ļ‚— Database Connectivity : JDBC.
ļ‚— Cloud Services: Any cloud service provider.
Flowchart1
Flowchart2
Algorithms
ļ‚— IBE Key Generation Algorithm
ļ‚— SAML-Based Authentication Algorithm
ļ‚— Push And Pull Pure Log mode for log record
generation
Logging Algorithm
Data flow Diagram
Use Case Diagram
Conclusion
ļ‚— We proposed innovative approach: CAI
framework and use of JAR file, for
automatically logging any access to the data
in the cloud together with an auditing
mechanism.
References
[1] ā€œInformation Accountability,ā€ Comm.ACM, vol. 51, no.
6, pp. 82-87, 2008.
[2] ā€œAccountability as a Way Forward for Privacy Protection in
the Cloud,ā€ Proc. First Int’l Conf. Cloud Computing,09.
[3] Logic for Auditing Accountability in Decentralized
Systems,ā€ Proc. IFIP TC1 WG1.7 Workshop Formal Aspects
in Security and Trust , pp. 187-201, 2005.
[4] The Design and Evaluation of Accountable Grid
Computing System,ā€ Proc. 29thIEEE Int’l Conf. Distributed
Computing Systems (ICDCS ’09),pp. 145-154, 2009.
References
[5]ā€œUsing Self-Defending Objects to Develop Security
Aware Applications in Java,ā€ Proc. 27th Australasian
Conf. Computer Science, vol. 26,pp. 341-349, 2004
[6] An Open Framework for Foundational Proof-
Carrying Code,ā€ Proc. ACM SIGPLAN Int’l Workshop
Types in Languages Design and Implementation, pp.
67-78,2007.
[7]ā€œTowards Accountable Management of Identity and
Privacy: Sticky Policies and Enforceable Tracing
Services,ā€ Proc. Int’l Workshop Database and Expert
Systems Applications (DEXA), pp. 377-382, 2003.
References
[8]ā€œUsage Control Enforcement: Present and Future,ā€
IEEE Security & Privacy, vol. 6, no. 4, pp. 44-
53, July/Aug. 2008.

Ensuring Distributed Accountability for Data Sharing in the Cloud

  • 1.
    Ensuring Distributed Accountabilityfor Data Sharing in the Cloud
  • 2.
    Introduction ļ‚— Cloud Computing ļ‚—Features of Cloud Computing 1) Scalability 2)Resource Virtualization
  • 3.
    Motivation ļ‚— Client Fearsof Loosing Control on Data. ļ‚— Question about (Cloud Service Provider)CSP reliability ļ‚— Significant Barriers for Cloud Computing
  • 4.
    Related Work ļ‚— InformationAccountability[1] ļ‚— Accountability mechanisms and Privacy Manager[2] ļ‚— Logic for Auditing Accountability in Decentralized Systems[3] ļ‚— Accountable Grid Computing System[4]
  • 5.
    Cont. ļ‚— Security Applicationsin JAVA using Self- Depending Objects[SDO][5] ļ‚— Proof-Carrying authentication (PCA)[6] ļ‚— Identity-Based Encryption[7] ļ‚— Current access control mechanism[8]
  • 6.
    Proposal ļ‚— Decentralized Technique ļ‚—Data Access automatic logging ļ‚— Reliable Log files ļ‚— Delivery of log files to Data Owner. 1)Push Mode 2)Pull Mode
  • 7.
    Hardware Requirement Two ormore systems of following config. ļ‚— Processor - Pentium IV onwards ļ‚— RAM- 512 MB DD RAM ļ‚— Hard Disk- 20 GB
  • 8.
  • 9.
    Software Requirements  OperatingSystem :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java  Server Sidé Script : Java Server Pages.  Database : MySQL 5.0  Database Connectivity : JDBC.  Cloud Services: Any cloud service provider.
  • 10.
  • 11.
  • 12.
    Algorithms ļ‚— IBE KeyGeneration Algorithm ļ‚— SAML-Based Authentication Algorithm ļ‚— Push And Pull Pure Log mode for log record generation
  • 13.
  • 14.
  • 15.
  • 16.
    Conclusion ļ‚— We proposedinnovative approach: CAI framework and use of JAR file, for automatically logging any access to the data in the cloud together with an auditing mechanism.
  • 17.
    References [1] ā€œInformation Accountability,ā€Comm.ACM, vol. 51, no. 6, pp. 82-87, 2008. [2] ā€œAccountability as a Way Forward for Privacy Protection in the Cloud,ā€ Proc. First Int’l Conf. Cloud Computing,09. [3] Logic for Auditing Accountability in Decentralized Systems,ā€ Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust , pp. 187-201, 2005. [4] The Design and Evaluation of Accountable Grid Computing System,ā€ Proc. 29thIEEE Int’l Conf. Distributed Computing Systems (ICDCS ’09),pp. 145-154, 2009.
  • 18.
    References [5]ā€œUsing Self-Defending Objectsto Develop Security Aware Applications in Java,ā€ Proc. 27th Australasian Conf. Computer Science, vol. 26,pp. 341-349, 2004 [6] An Open Framework for Foundational Proof- Carrying Code,ā€ Proc. ACM SIGPLAN Int’l Workshop Types in Languages Design and Implementation, pp. 67-78,2007. [7]ā€œTowards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services,ā€ Proc. Int’l Workshop Database and Expert Systems Applications (DEXA), pp. 377-382, 2003.
  • 19.
    References [8]ā€œUsage Control Enforcement:Present and Future,ā€ IEEE Security & Privacy, vol. 6, no. 4, pp. 44- 53, July/Aug. 2008.