SlideShare a Scribd company logo
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Maintaining Secure Cloud b
M. Kanimozhi, A.
Department of Computer Science and Engineering,
G.K.M. College of Engineering and Technology,
ABSTRACT
Increases in cloud computing capacity, as well as
decreases in the cost of processing, are moving at a
fast pace. These patterns make it incumbent upon
organizations to keep pace with changes in
technology that significantly influence security. Cloud
security auditing depends upon the environment, and
the rapid growth of cloud computing is an important
new context in world economics. The small price of
entry, bandwidth, and processing power capability
means that individuals and organizations of all sizes
have more capacity and agility to exercise shifts in
computation and to disrupt industry in cyberspace
than more traditional domains of business economics
worldwide. An analysis of prevalent cloud security
issues and the utilization of cloud audit methods ca
mitigate security concerns. This verification
methodology indicates how to use frameworks to
review cloud service providers (CSPs).
barrier to widespread uptake of cloud computing is
the lack of trust in clouds by potential customers.
While preventive controls for security and privacy are
actively researched, there is still little focus on
detective controls related to cloud accountability and
auditability. The complexity resulting from large
scale virtualization and data distribution carried out
current clouds has revealed an urgent research agenda
for cloud accountability, as has the shift in focus of
customer concerns from servers to data.
Keywords: trust in cloud computing,
providers (CSPs), logging, auditability,
accountability, data provenance, continuous auditing
and monitoring, governance
Introduction
Cloud computing is the term used to share the
resources globally with less cost .we can also called as
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Maintaining Secure Cloud by Continuous Auditing
Kanimozhi, A. Aishwarya, S. Triumal
Department of Computer Science and Engineering,
G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu
Increases in cloud computing capacity, as well as
decreases in the cost of processing, are moving at a
fast pace. These patterns make it incumbent upon
organizations to keep pace with changes in
technology that significantly influence security. Cloud
ity auditing depends upon the environment, and
the rapid growth of cloud computing is an important
new context in world economics. The small price of
entry, bandwidth, and processing power capability
means that individuals and organizations of all sizes
ve more capacity and agility to exercise shifts in
computation and to disrupt industry in cyberspace
than more traditional domains of business economics
worldwide. An analysis of prevalent cloud security
issues and the utilization of cloud audit methods can
mitigate security concerns. This verification
methodology indicates how to use frameworks to
review cloud service providers (CSPs). The key
barrier to widespread uptake of cloud computing is
the lack of trust in clouds by potential customers.
ntive controls for security and privacy are
actively researched, there is still little focus on
detective controls related to cloud accountability and
auditability. The complexity resulting from large-
scale virtualization and data distribution carried out in
current clouds has revealed an urgent research agenda
for cloud accountability, as has the shift in focus of
cloud service
providers (CSPs), logging, auditability,
accountability, data provenance, continuous auditing
Cloud computing is the term used to share the
resources globally with less cost .we can also called as
“IT ON DEMAND”. It provides 3 varieties of
services i.e., Infrastructure as a service (IaaS),
Platform as a service (PaaS) and package as a
service(SaaS)[3]. The ever cheaper and additional
powerful processors, along with the software as a
service (SaaS) computing design, square measure
reworking knowledge centers into pools of computing
service on a large scale. End users access the cloud
based applications through the web browsers with
internet connection. Moving knowledge to clouds
makes more convenient and reduce to manage
hardware complexities. Knowledge stored at clouds
are maintained by Cloud service providers (CSP) with
various incentives for different levels of services [2].
However it deletes the responsibility of local
machines to maintain knowled
lose information or it effects from external or internal
attacks [1]. Our contribution can be summarized as
the following three aspects:
1) Compared to several of its predecessors, that only
give binary results concerning the storage
across the distributed servers, the planned theme
achieves the combination of storage correctness
insurance and knowledge error localization, i.e.,
the identification of misbehaving server(s).
2) Unlike most previous works for ensuring remote
knowledge integrity, the new scheme further
supports secure and convenient dynamic
operations on data blocks, including: update,
delete, append and insert.
3) The experiment results demonstrate the proposed
scheme is highly convenient. Extensive security
analysis shows our scheme is resilient against
Byzantine failure, malicious information
Apr 2018 Page: 515
6470 | www.ijtsrd.com | Volume - 2 | Issue – 3
Scientific
(IJTSRD)
Access Journal
y Continuous Auditing
Tamil Nadu, India
“IT ON DEMAND”. It provides 3 varieties of
services i.e., Infrastructure as a service (IaaS),
Platform as a service (PaaS) and package as a
service(SaaS)[3]. The ever cheaper and additional
powerful processors, along with the software as a
omputing design, square measure
reworking knowledge centers into pools of computing
service on a large scale. End users access the cloud
based applications through the web browsers with
internet connection. Moving knowledge to clouds
and reduce to manage
hardware complexities. Knowledge stored at clouds
are maintained by Cloud service providers (CSP) with
various incentives for different levels of services [2].
However it deletes the responsibility of local
machines to maintain knowledge, there is a chance to
lose information or it effects from external or internal
attacks [1]. Our contribution can be summarized as
Compared to several of its predecessors, that only
give binary results concerning the storage standing
across the distributed servers, the planned theme
achieves the combination of storage correctness
insurance and knowledge error localization, i.e.,
the identification of misbehaving server(s).
Unlike most previous works for ensuring remote
dge integrity, the new scheme further
supports secure and convenient dynamic
operations on data blocks, including: update,
The experiment results demonstrate the proposed
scheme is highly convenient. Extensive security
shows our scheme is resilient against
Byzantine failure, malicious information
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 516
modification attack, and also server colluding
attacks.
Related works
A. Governance, Risk Management and Compliance
(GRC) Stack of the Cloud Security Alliance
(CSA)
The Cloud Security Alliance (CSA), comprised of
many subject matter experts from academia and
leading organizations, is a non-profit organization
formed to promote best practices for providing
security assurance within Cloud Computing, and
provide education on Cloud Computing. Two projects
from the CSA’s Governance, Risk Management and
Compliance (GRC) Stack are relevant: CloudAudit
[19] and the Trusted Cloud Initiative [20].
B. HP Labs – Cloud and Security Lab
Pearson and Mowbray have done research on
technical and procedural methods for promoting cloud
privacy [21, 22]. Recently, Ko, Lee and Pearson
established the case for accountability in [10], via a
short paper covering scenarios and concerns of
accountability within the cloud.
C. University of Pennsylvania/ Max Planck
Institute for Software Systems
Haeberlen et al. were one of the first researchers to
call for awareness in an accountable cloud [23]. In
[23], they assumed a primitive AUDIT with
considerations of agreement, service and timestamps.
However, AUDIT did not have a clear explanation of
the scope, scale, phases and layers of abstraction of
accountability. It is our aim to complement their
work. They also proposed an approach for
accountable VMs [24], and discussed a case study on
the application to detect cheats in an online multi-
player game Counterstrike. This non-cloud based
game was not a practical business scenario for
accountability, and did not address the needs of
logging virtual-to-physical mapping.
D. HyTrust Appliance [8] Recently, HyTrust, a
startup focusing on cloud auditing and accountability,
has released a hypervisor consolidated log report and
policy enforcement tool for VM accountability
management. HyTrust Appliance addresses the
System layer (recall Section IV) of cloud
accountability. It focuses on the virtual layers and
does not log virtual-to physical complexities. It also
views accountability from a system perspective and
not a file-centric perspective.
E. Accountability of Services by CSIRO Chen and
Wang of CSIRO currently have a team looking at
“accountability as a service” for the cloud [25, 26].
Their work presented a prototype which enforces
accountability of service providers whose services are
deployed in the cloud. This is achieved by making the
service providers responsible for faulty services and a
technique which allows identification of the cause of
faults in binding Web services.
F. Provenance in Clouds Muniswamy-Reddy et al.
[27] discuss the main challenges of provenance
adoption for cloud computing and suggest four
properties (data coupling, multi-object casual
ordering, data-independent persistence, and efficient
querying) that make provenance systems truly useful.
Secure provenance [28] and privacy-aware
provenance [29] have also been proposed for cloud
computing systems, as provenance information may
contain or expose sensitive, confidential or
proprietary information directly or indirectly.
Proposed System
Finally, we propose architecture to continuously audit
cloud services in a practically and economically
feasible manner. Our conceptual architecture
highlights important components (i.e., various
interfaces and auditing management modules) as well
as processes that have to be implemented. However,
methodologies to efficiently and continuously audit
cloud services are still in their infancy. With our
study, a first step to increase trustworthiness of CSC
is provided by conceptualizing architecture to
continuously audit cloud services.
Continuous Auditing:
When you hear the word “audit,” you probably don’t
think about an ongoing, regular process. Instead, your
stomach might drop a little at the thought of an
examination by the IRS, or maybe you’ve established
a periodic internal assessment. Continuous auditing,
however, can be an ally in keeping your system
secure, and with advancements in technology, it’s not
that intimidating to take advantage of it. In fact,
some managed service providers take care of the
details, tailoring a continuous audit system to your
organization’s unique needs.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 517
Fig. 1 Continuous Auditing in cloud
 Process of Continuous Auditing:
According to a white paper by the American Institute
of CPAs (AICPA), companies have successfully used
continuous auditing and continuous monitoring
(CA/CM) processes to make better decisions about
risk by analyzing key business data and metrics,
giving them an important competitive advantage. By
constantly tracking your data system, you can
evaluate it against industry regulations, such as PCI,
and identify deviations or risks faster. Because
breaches in compliance or information security can
quickly spiral out of control, it’s a huge advantage to
be able to recognize and respond to any issues before
much time elapses.
 Advantage of continuous auditing services
When working with a cloud service provider, you
should inquire into their continuous auditing
offerings, such as Tripwire Configuration
Assessment. You can partner with your provider to
track your system according to your own custom
rules, ensuring that the monitoring process addresses
your specific infrastructure setup and the metrics that
are important to your business.
Continuous auditing services can give you peace of
mind knowing that any deviations from a trusted
system state will trigger alerts in real-time. Real-time
reporting makes it possible to react to system changes
without compromising performance or compliance,
helping to keep your solution secure.
Fig. 2 Architecture
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
A. Server Configuration
During server configuration and setup, you can select
the operating system, memory and storage. These
selections should be based on application workload
and technical requirements. You can also select the
Fig. 3
B. Data Upload and Block Split:
When you store a file in HDFS, the system breaks it
down into a set of individual blocks and stores these
HDFS has no idea (and doesn’t care) what’s stored
inside the file, so raw files are not split in accordance
with rules that we humans would understand.
Humans, for example, would want
boundaries — the lines showing where a record
begins and ends — to be respected. HDFS is often
blissfully unaware that the final record in one block
may be only a partial record, with the rest of its
content shunted off to the following block. HDFS
only wants to make sure that files are split into evenly
sized blocks that match the predefined block
the Hadoop instance (unless a custom value was
entered for the file being stored). In the preceding
figure, that block size is 128MB. The concept of
storing a file as a collection of blocks is entirely
consistent with how file systems normally wo
what’s different about HDFS is the scale. A typical
block size that you’d see in a file system under Linux
is 4KB, whereas a typical block size in Hadoop is
128MB. This value is configurable, and it can be
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
During server configuration and setup, you can select
the operating system, memory and storage. These
selections should be based on application workload
and technical requirements. You can also select the
location of the data centre where the high
performance computing instance will be hosted. If the
workload requires higher throughput with low
latency, you should add InfiniBand, which can
support up to 56 GB per second of throughput for
your HPC on Soft Layer compute instance.
Fig. 3 Server and System Configuration
When you store a file in HDFS, the system breaks it
down into a set of individual blocks and stores these
blocks in various slave nodes in the Hadoop cluster.
This is an entirely normal thing to do, as all file
systems break files down into blocks before storing
them to disk.
care) what’s stored
inside the file, so raw files are not split in accordance
with rules that we humans would understand.
Humans, for example, would want record
the lines showing where a record
to be respected. HDFS is often
blissfully unaware that the final record in one block
may be only a partial record, with the rest of its
content shunted off to the following block. HDFS
only wants to make sure that files are split into evenly
sized blocks that match the predefined block size for
the Hadoop instance (unless a custom value was
entered for the file being stored). In the preceding
figure, that block size is 128MB. The concept of
storing a file as a collection of blocks is entirely
consistent with how file systems normally work. But
what’s different about HDFS is the scale. A typical
block size that you’d see in a file system under Linux
is 4KB, whereas a typical block size in Hadoop is
128MB. This value is configurable, and it can be
customized, as both a new system default a
custom value for individual files. Hadoop was
designed to store data at the petabyte scale, where any
potential limitations to scaling out are minimized. The
high block size is a direct consequence of this need to
store data on a massive scale.
C. Data Integrity Checking
The basic idea of the project applies only to static
storage of data. It cannot handle to case when the data
need to be dynamically changed. This dynamic data
integrity is used to support for data dynamics via the
most general forms of data operation, such
modification, insertion, and deletion, is also a
significant step toward practicality. While prior work
on ensuring remote data integrity often lacks the
support of either public auditability or dynamic data
operations. The project first identify
and potential security problems of direct extensions
with fully dynamic data updates from prior works and
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Apr 2018 Page: 518
location of the data centre where the high-
nce computing instance will be hosted. If the
workload requires higher throughput with low
latency, you should add InfiniBand, which can
support up to 56 GB per second of throughput for
your HPC on Soft Layer compute instance.
various slave nodes in the Hadoop cluster.
This is an entirely normal thing to do, as all file
systems break files down into blocks before storing
customized, as both a new system default and a
custom value for individual files. Hadoop was
designed to store data at the petabyte scale, where any
potential limitations to scaling out are minimized. The
high block size is a direct consequence of this need to
The basic idea of the project applies only to static
storage of data. It cannot handle to case when the data
need to be dynamically changed. This dynamic data
integrity is used to support for data dynamics via the
most general forms of data operation, such as block
modification, insertion, and deletion, is also a
significant step toward practicality. While prior work
on ensuring remote data integrity often lacks the
support of either public auditability or dynamic data
operations. The project first identify the difficulties
and potential security problems of direct extensions
with fully dynamic data updates from prior works and
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 519
then show how to construct an elegant verification
scheme for the seamless integration. To achieve
efficient data dynamics, we improve the existing
proof of storage models by manipulating the classic
Merkle Hash Tree construction for block tag
authentication.
D. Experimental evaluation
A digital signature or digital signature scheme is a
mathematical scheme for demonstrating the
authenticity of a digital message or document. A valid
digital signature gives a recipient reason to believe
that the message was created by a known sender, and
that it was not altered in transit. Digital signatures are
commonly used for software distribution, financial
transactions, and in other cases where it is important
to detect forgery or tampering. Digital signatures
employ a type of asymmetric cryptography. For
messages sent through a non secure channel, a
properly implemented digital signature gives the
receiver reason to believe the message was sent by the
claimed sender. Digital signatures are equivalent to
traditional handwritten signatures in many respects;
properly implemented digital signatures are more
difficult to forge than the handwritten type. Digital
signature schemes in the sense used here are
cryptographically based, and must be implemented
properly to be effective. Digital signatures can also
provide non-repudiation, meaning that the signer
cannot successfully claim they did not sign a message,
while also claiming their private key remains secret;
further, some non-repudiation schemes offer a time
stamp for the digital signature, so that even if the
private key is exposed, the signature is valid
nonetheless.
CONCLUSIONS
In this paper, we establish the urgent need for research
in cloud accountability. We propose detective rather
than preventive approaches to increasing
accountability. Detective approaches complement
preventive approaches as they are non-invasive, and
enable the investigation not only of external risks, but
also risks from within the CSP. With the shift in end-
users’ concerns from system health and performance
to the integrity and accountability of data stored in the
cloud, we require a file-centric perspective, on top of
the usual system-centric perspective for logging.
Using the abstraction layers defined via the
TrustCloud framework, we were able to list several
cloud accountability issues previously not mentioned
in cloud computing literature.
We intend to develop a system based on the
TrustCloud framework that gives cloud users a single
point of view for accountability of the CSP. We are
currently researching and developing solutions for
each accountability layer, with one example being a
logging mechanism for the system layer.
REFERENCES
1. Juels, A. and Oprea, A., 2013. New approaches to
security and availability for cloud
data. Communications of the ACM, 56(2), pp.64-
73.
2. Chatterjee, R., Roy, S. and Scholar, U.G., 2017.
Cryptography in Cloud Computing: A Basic
Approach to Ensure Security in
Cloud. International Journal of Engineering
Science, 11818.
3. Ganesh, A., 2017. Security Capabilities Of Fine
Grained Two Factor Access Control In Web
Based Cloud Computing Services.
4. Subashini, S. and Kavitha, V., 2011. A survey on
security issues in service delivery models of cloud
computing. Journal of network and computer
applications, 34(1), pp.1-11.
5. Sah, B.K., Yadav, D. and Rain, C.K., 2017. Cloud
Computing Using AES.
6. Pancholi, V.R. and Patel, B.P., 2016.
Enhancement of cloud computing security with
secure data storage using AES. International
Journal for Innovative Research in Science and
Technology, 2(9), pp.18-21.
7. Lins, S., Schneider, S. and Sunyaev, A., 2016.
Trust is good, control is better: Creating secure
clouds by continuous auditing. IEEE Transactions
on Cloud Computing.
8. Wang, C., Wang, Q., Ren, K., Cao, N. and Lou,
W., 2012. Toward secure and dependable storage
services in cloud computing. IEEE transactions
on Services Computing, 5(2), pp.220-232.

More Related Content

What's hot

FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
ijccsa
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
IJNSA Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
Eswar Publications
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titlesingenioustech
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingIAEME Publication
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
Istiyak Siddiquee
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IJECEIAES
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in CloudsSecure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computing
eSAT Journals
 
G033030035
G033030035G033030035
G033030035
ijceronline
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 

What's hot (19)

FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
70 74
70 7470 74
70 74
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in CloudsSecure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
 
40 41
40 4140 41
40 41
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computing
 
G033030035
G033030035G033030035
G033030035
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 

Similar to Maintaining Secure Cloud by Continuous Auditing

Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
Shahbaz Sidhu
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
IJERA Editor
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
IRJET Journal
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
IOSR Journals
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
acijjournal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 

Similar to Maintaining Secure Cloud by Continuous Auditing (20)

Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Maintaining Secure Cloud by Continuous Auditing

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Maintaining Secure Cloud b M. Kanimozhi, A. Department of Computer Science and Engineering, G.K.M. College of Engineering and Technology, ABSTRACT Increases in cloud computing capacity, as well as decreases in the cost of processing, are moving at a fast pace. These patterns make it incumbent upon organizations to keep pace with changes in technology that significantly influence security. Cloud security auditing depends upon the environment, and the rapid growth of cloud computing is an important new context in world economics. The small price of entry, bandwidth, and processing power capability means that individuals and organizations of all sizes have more capacity and agility to exercise shifts in computation and to disrupt industry in cyberspace than more traditional domains of business economics worldwide. An analysis of prevalent cloud security issues and the utilization of cloud audit methods ca mitigate security concerns. This verification methodology indicates how to use frameworks to review cloud service providers (CSPs). barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from large scale virtualization and data distribution carried out current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. Keywords: trust in cloud computing, providers (CSPs), logging, auditability, accountability, data provenance, continuous auditing and monitoring, governance Introduction Cloud computing is the term used to share the resources globally with less cost .we can also called as @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Maintaining Secure Cloud by Continuous Auditing Kanimozhi, A. Aishwarya, S. Triumal Department of Computer Science and Engineering, G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu Increases in cloud computing capacity, as well as decreases in the cost of processing, are moving at a fast pace. These patterns make it incumbent upon organizations to keep pace with changes in technology that significantly influence security. Cloud ity auditing depends upon the environment, and the rapid growth of cloud computing is an important new context in world economics. The small price of entry, bandwidth, and processing power capability means that individuals and organizations of all sizes ve more capacity and agility to exercise shifts in computation and to disrupt industry in cyberspace than more traditional domains of business economics worldwide. An analysis of prevalent cloud security issues and the utilization of cloud audit methods can mitigate security concerns. This verification methodology indicates how to use frameworks to review cloud service providers (CSPs). The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. ntive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from large- scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of cloud service providers (CSPs), logging, auditability, accountability, data provenance, continuous auditing Cloud computing is the term used to share the resources globally with less cost .we can also called as “IT ON DEMAND”. It provides 3 varieties of services i.e., Infrastructure as a service (IaaS), Platform as a service (PaaS) and package as a service(SaaS)[3]. The ever cheaper and additional powerful processors, along with the software as a service (SaaS) computing design, square measure reworking knowledge centers into pools of computing service on a large scale. End users access the cloud based applications through the web browsers with internet connection. Moving knowledge to clouds makes more convenient and reduce to manage hardware complexities. Knowledge stored at clouds are maintained by Cloud service providers (CSP) with various incentives for different levels of services [2]. However it deletes the responsibility of local machines to maintain knowled lose information or it effects from external or internal attacks [1]. Our contribution can be summarized as the following three aspects: 1) Compared to several of its predecessors, that only give binary results concerning the storage across the distributed servers, the planned theme achieves the combination of storage correctness insurance and knowledge error localization, i.e., the identification of misbehaving server(s). 2) Unlike most previous works for ensuring remote knowledge integrity, the new scheme further supports secure and convenient dynamic operations on data blocks, including: update, delete, append and insert. 3) The experiment results demonstrate the proposed scheme is highly convenient. Extensive security analysis shows our scheme is resilient against Byzantine failure, malicious information Apr 2018 Page: 515 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3 Scientific (IJTSRD) Access Journal y Continuous Auditing Tamil Nadu, India “IT ON DEMAND”. It provides 3 varieties of services i.e., Infrastructure as a service (IaaS), Platform as a service (PaaS) and package as a service(SaaS)[3]. The ever cheaper and additional powerful processors, along with the software as a omputing design, square measure reworking knowledge centers into pools of computing service on a large scale. End users access the cloud based applications through the web browsers with internet connection. Moving knowledge to clouds and reduce to manage hardware complexities. Knowledge stored at clouds are maintained by Cloud service providers (CSP) with various incentives for different levels of services [2]. However it deletes the responsibility of local machines to maintain knowledge, there is a chance to lose information or it effects from external or internal attacks [1]. Our contribution can be summarized as Compared to several of its predecessors, that only give binary results concerning the storage standing across the distributed servers, the planned theme achieves the combination of storage correctness insurance and knowledge error localization, i.e., the identification of misbehaving server(s). Unlike most previous works for ensuring remote dge integrity, the new scheme further supports secure and convenient dynamic operations on data blocks, including: update, The experiment results demonstrate the proposed scheme is highly convenient. Extensive security shows our scheme is resilient against Byzantine failure, malicious information
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 516 modification attack, and also server colluding attacks. Related works A. Governance, Risk Management and Compliance (GRC) Stack of the Cloud Security Alliance (CSA) The Cloud Security Alliance (CSA), comprised of many subject matter experts from academia and leading organizations, is a non-profit organization formed to promote best practices for providing security assurance within Cloud Computing, and provide education on Cloud Computing. Two projects from the CSA’s Governance, Risk Management and Compliance (GRC) Stack are relevant: CloudAudit [19] and the Trusted Cloud Initiative [20]. B. HP Labs – Cloud and Security Lab Pearson and Mowbray have done research on technical and procedural methods for promoting cloud privacy [21, 22]. Recently, Ko, Lee and Pearson established the case for accountability in [10], via a short paper covering scenarios and concerns of accountability within the cloud. C. University of Pennsylvania/ Max Planck Institute for Software Systems Haeberlen et al. were one of the first researchers to call for awareness in an accountable cloud [23]. In [23], they assumed a primitive AUDIT with considerations of agreement, service and timestamps. However, AUDIT did not have a clear explanation of the scope, scale, phases and layers of abstraction of accountability. It is our aim to complement their work. They also proposed an approach for accountable VMs [24], and discussed a case study on the application to detect cheats in an online multi- player game Counterstrike. This non-cloud based game was not a practical business scenario for accountability, and did not address the needs of logging virtual-to-physical mapping. D. HyTrust Appliance [8] Recently, HyTrust, a startup focusing on cloud auditing and accountability, has released a hypervisor consolidated log report and policy enforcement tool for VM accountability management. HyTrust Appliance addresses the System layer (recall Section IV) of cloud accountability. It focuses on the virtual layers and does not log virtual-to physical complexities. It also views accountability from a system perspective and not a file-centric perspective. E. Accountability of Services by CSIRO Chen and Wang of CSIRO currently have a team looking at “accountability as a service” for the cloud [25, 26]. Their work presented a prototype which enforces accountability of service providers whose services are deployed in the cloud. This is achieved by making the service providers responsible for faulty services and a technique which allows identification of the cause of faults in binding Web services. F. Provenance in Clouds Muniswamy-Reddy et al. [27] discuss the main challenges of provenance adoption for cloud computing and suggest four properties (data coupling, multi-object casual ordering, data-independent persistence, and efficient querying) that make provenance systems truly useful. Secure provenance [28] and privacy-aware provenance [29] have also been proposed for cloud computing systems, as provenance information may contain or expose sensitive, confidential or proprietary information directly or indirectly. Proposed System Finally, we propose architecture to continuously audit cloud services in a practically and economically feasible manner. Our conceptual architecture highlights important components (i.e., various interfaces and auditing management modules) as well as processes that have to be implemented. However, methodologies to efficiently and continuously audit cloud services are still in their infancy. With our study, a first step to increase trustworthiness of CSC is provided by conceptualizing architecture to continuously audit cloud services. Continuous Auditing: When you hear the word “audit,” you probably don’t think about an ongoing, regular process. Instead, your stomach might drop a little at the thought of an examination by the IRS, or maybe you’ve established a periodic internal assessment. Continuous auditing, however, can be an ally in keeping your system secure, and with advancements in technology, it’s not that intimidating to take advantage of it. In fact, some managed service providers take care of the details, tailoring a continuous audit system to your organization’s unique needs.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 517 Fig. 1 Continuous Auditing in cloud  Process of Continuous Auditing: According to a white paper by the American Institute of CPAs (AICPA), companies have successfully used continuous auditing and continuous monitoring (CA/CM) processes to make better decisions about risk by analyzing key business data and metrics, giving them an important competitive advantage. By constantly tracking your data system, you can evaluate it against industry regulations, such as PCI, and identify deviations or risks faster. Because breaches in compliance or information security can quickly spiral out of control, it’s a huge advantage to be able to recognize and respond to any issues before much time elapses.  Advantage of continuous auditing services When working with a cloud service provider, you should inquire into their continuous auditing offerings, such as Tripwire Configuration Assessment. You can partner with your provider to track your system according to your own custom rules, ensuring that the monitoring process addresses your specific infrastructure setup and the metrics that are important to your business. Continuous auditing services can give you peace of mind knowing that any deviations from a trusted system state will trigger alerts in real-time. Real-time reporting makes it possible to react to system changes without compromising performance or compliance, helping to keep your solution secure. Fig. 2 Architecture
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com A. Server Configuration During server configuration and setup, you can select the operating system, memory and storage. These selections should be based on application workload and technical requirements. You can also select the Fig. 3 B. Data Upload and Block Split: When you store a file in HDFS, the system breaks it down into a set of individual blocks and stores these HDFS has no idea (and doesn’t care) what’s stored inside the file, so raw files are not split in accordance with rules that we humans would understand. Humans, for example, would want boundaries — the lines showing where a record begins and ends — to be respected. HDFS is often blissfully unaware that the final record in one block may be only a partial record, with the rest of its content shunted off to the following block. HDFS only wants to make sure that files are split into evenly sized blocks that match the predefined block the Hadoop instance (unless a custom value was entered for the file being stored). In the preceding figure, that block size is 128MB. The concept of storing a file as a collection of blocks is entirely consistent with how file systems normally wo what’s different about HDFS is the scale. A typical block size that you’d see in a file system under Linux is 4KB, whereas a typical block size in Hadoop is 128MB. This value is configurable, and it can be International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 During server configuration and setup, you can select the operating system, memory and storage. These selections should be based on application workload and technical requirements. You can also select the location of the data centre where the high performance computing instance will be hosted. If the workload requires higher throughput with low latency, you should add InfiniBand, which can support up to 56 GB per second of throughput for your HPC on Soft Layer compute instance. Fig. 3 Server and System Configuration When you store a file in HDFS, the system breaks it down into a set of individual blocks and stores these blocks in various slave nodes in the Hadoop cluster. This is an entirely normal thing to do, as all file systems break files down into blocks before storing them to disk. care) what’s stored inside the file, so raw files are not split in accordance with rules that we humans would understand. Humans, for example, would want record the lines showing where a record to be respected. HDFS is often blissfully unaware that the final record in one block may be only a partial record, with the rest of its content shunted off to the following block. HDFS only wants to make sure that files are split into evenly sized blocks that match the predefined block size for the Hadoop instance (unless a custom value was entered for the file being stored). In the preceding figure, that block size is 128MB. The concept of storing a file as a collection of blocks is entirely consistent with how file systems normally work. But what’s different about HDFS is the scale. A typical block size that you’d see in a file system under Linux is 4KB, whereas a typical block size in Hadoop is 128MB. This value is configurable, and it can be customized, as both a new system default a custom value for individual files. Hadoop was designed to store data at the petabyte scale, where any potential limitations to scaling out are minimized. The high block size is a direct consequence of this need to store data on a massive scale. C. Data Integrity Checking The basic idea of the project applies only to static storage of data. It cannot handle to case when the data need to be dynamically changed. This dynamic data integrity is used to support for data dynamics via the most general forms of data operation, such modification, insertion, and deletion, is also a significant step toward practicality. While prior work on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations. The project first identify and potential security problems of direct extensions with fully dynamic data updates from prior works and International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Apr 2018 Page: 518 location of the data centre where the high- nce computing instance will be hosted. If the workload requires higher throughput with low latency, you should add InfiniBand, which can support up to 56 GB per second of throughput for your HPC on Soft Layer compute instance. various slave nodes in the Hadoop cluster. This is an entirely normal thing to do, as all file systems break files down into blocks before storing customized, as both a new system default and a custom value for individual files. Hadoop was designed to store data at the petabyte scale, where any potential limitations to scaling out are minimized. The high block size is a direct consequence of this need to The basic idea of the project applies only to static storage of data. It cannot handle to case when the data need to be dynamically changed. This dynamic data integrity is used to support for data dynamics via the most general forms of data operation, such as block modification, insertion, and deletion, is also a significant step toward practicality. While prior work on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations. The project first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 519 then show how to construct an elegant verification scheme for the seamless integration. To achieve efficient data dynamics, we improve the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication. D. Experimental evaluation A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. Digital signatures employ a type of asymmetric cryptography. For messages sent through a non secure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten signatures in many respects; properly implemented digital signatures are more difficult to forge than the handwritten type. Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid nonetheless. CONCLUSIONS In this paper, we establish the urgent need for research in cloud accountability. We propose detective rather than preventive approaches to increasing accountability. Detective approaches complement preventive approaches as they are non-invasive, and enable the investigation not only of external risks, but also risks from within the CSP. With the shift in end- users’ concerns from system health and performance to the integrity and accountability of data stored in the cloud, we require a file-centric perspective, on top of the usual system-centric perspective for logging. Using the abstraction layers defined via the TrustCloud framework, we were able to list several cloud accountability issues previously not mentioned in cloud computing literature. We intend to develop a system based on the TrustCloud framework that gives cloud users a single point of view for accountability of the CSP. We are currently researching and developing solutions for each accountability layer, with one example being a logging mechanism for the system layer. REFERENCES 1. Juels, A. and Oprea, A., 2013. New approaches to security and availability for cloud data. Communications of the ACM, 56(2), pp.64- 73. 2. Chatterjee, R., Roy, S. and Scholar, U.G., 2017. Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud. International Journal of Engineering Science, 11818. 3. Ganesh, A., 2017. Security Capabilities Of Fine Grained Two Factor Access Control In Web Based Cloud Computing Services. 4. Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), pp.1-11. 5. Sah, B.K., Yadav, D. and Rain, C.K., 2017. Cloud Computing Using AES. 6. Pancholi, V.R. and Patel, B.P., 2016. Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), pp.18-21. 7. Lins, S., Schneider, S. and Sunyaev, A., 2016. Trust is good, control is better: Creating secure clouds by continuous auditing. IEEE Transactions on Cloud Computing. 8. Wang, C., Wang, Q., Ren, K., Cao, N. and Lou, W., 2012. Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5(2), pp.220-232.