3. Motivation
Client Fears of Loosing Control on Data.
Question about (Cloud Service
Provider)CSP reliability
Significant Barriers for Cloud Computing
4. Related Work
Information Accountability[1]
Accountability mechanisms and Privacy
Manager[2]
Logic for Auditing Accountability in
Decentralized Systems[3]
Accountable Grid Computing System[4]
5. Cont.
Security Applications in JAVA using Self-
Depending Objects[SDO][5]
Proof-Carrying authentication (PCA)[6]
Identity-Based Encryption[7]
Current access control mechanism[8]
6. Proposal
Decentralized Technique
Data Access automatic logging
Reliable Log files
Delivery of log files to Data Owner.
1)Push Mode
2)Pull Mode
7. Hardware Requirement
Two or more systems of following config.
Processor - Pentium IV onwards
RAM- 512 MB DD RAM
Hard Disk- 20 GB
9. Software Requirements
Operating System :Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java
Server Sidé Script : Java Server Pages.
Database : MySQL 5.0
Database Connectivity : JDBC.
Cloud Services: Any cloud service provider.
16. Conclusion
We proposed innovative approach: CAI
framework and use of JAR file, for
automatically logging any access to the data
in the cloud together with an auditing
mechanism.
17. References
[1] “Information Accountability,” Comm.ACM, vol. 51, no.
6, pp. 82-87, 2008.
[2] “Accountability as a Way Forward for Privacy Protection in
the Cloud,” Proc. First Int’l Conf. Cloud Computing,09.
[3] Logic for Auditing Accountability in Decentralized
Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects
in Security and Trust , pp. 187-201, 2005.
[4] The Design and Evaluation of Accountable Grid
Computing System,” Proc. 29thIEEE Int’l Conf. Distributed
Computing Systems (ICDCS ’09),pp. 145-154, 2009.
18. References
[5]“Using Self-Defending Objects to Develop Security
Aware Applications in Java,” Proc. 27th Australasian
Conf. Computer Science, vol. 26,pp. 341-349, 2004
[6] An Open Framework for Foundational Proof-
Carrying Code,” Proc. ACM SIGPLAN Int’l Workshop
Types in Languages Design and Implementation, pp.
67-78,2007.
[7]“Towards Accountable Management of Identity and
Privacy: Sticky Policies and Enforceable Tracing
Services,” Proc. Int’l Workshop Database and Expert
Systems Applications (DEXA), pp. 377-382, 2003.