This document proposes a Cloud Information Accountability (CIA) framework to address lack of trust and compliance issues in cloud computing. The CIA framework uses a decentralized logging and auditing approach to track data usage in dynamic cloud environments. It includes a logger that is coupled with user data and policies to log all access, and a log harmonizer that periodically sends logs to data owners for auditing. The proposed approach aims to provide transparency and control over outsourced data while being platform independent and scalable.
This document proposes the Cloud Information Accountability (CIA) framework to address issues of data protection and user control in cloud computing. The CIA framework uses a decentralized, object-centered approach to automatically log all access to user data in the cloud. It includes logger and log harmonizer components that are strongly coupled with user data to track usage according to access and usage control policies. This logging mechanism provides end-to-end accountability across the complex cloud service chain in a platform-independent and highly distributed manner, allowing users to audit their data usage and enforce protections when needed.
The document proposes a Cloud Information Accountability (CIA) framework to address concerns about lack of control and transparency when data is stored in the cloud. The CIA framework uses a novel logging and auditing technique that automatically logs any access to user data in a decentralized manner. It allows data owners to track how their data is being used according to service agreements or policies. The framework has two major components: a logger that is strongly coupled with user data, and a log harmonizer. The CIA framework aims to provide transparency, enforce access controls, and strengthen user control over their cloud data.
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
The document proposes a system for ensuring distributed accountability and security for user data stored in the cloud. The system encrypts user data and wraps it in a JAR file along with access policies. It uses DES for encryption, RSA for JAR file security, and MD5 for authentication. Log records of access are generated, encrypted, and stored in log files. A log harmonizer tracks the logs and can push or pull them to ensure the data owner's data is secure. The system aims to provide accountability, enforce access controls, and prevent attacks like copying or disassembling protected data.
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
The document proposes a decentralized technique called the CAI framework to automatically log any access to data stored in the cloud. This framework uses Java archive (JAR) files to log data access and provide an auditing mechanism. It includes algorithms for identity-based encryption and authentication as well as push and pull modes for generating log records. The system architecture involves multiple server systems running software like Tomcat and MySQL to provide the cloud logging functionality.
Ensuring Distributed Accountability in the CloudSuraj Mehta
This document outlines a project to ensure distributed accountability for data sharing in the cloud. It discusses the existing centralized system and outlines the proposed decentralized system with distributed accountability and automatic logging. The document includes sections on future scope, product features like JAR creation and data policies, an overview, security measures for copying and man-in-the-middle attacks, and technical specifications. It concludes that the goal of distributed accountability based on user privilege levels was achieved.
Ensuring distributed accountability for data sharing in the cloudSathya Moorthy
The document proposes a Cloud Information Accountability (CIA) framework to provide end-to-end accountability for data sharing in the cloud. The CIA framework uses a decentralized logging mechanism coupled with the user's data to automatically log all access. It also includes distinct push and pull modes for auditing, where logs are periodically sent or can be retrieved by the user. The implementation involves major components of loggers that record access and a log harmonizer that allows user access to the logs.
Distributed accountability for data sharing in cloudChanakya Chandu
The document proposes a Cloud Information Accountability (CIA) framework to provide end-to-end accountability for data stored in the cloud. The CIA framework uses a logger component associated with each user's data to log all access and encrypt the logs. It also includes a log harmonizer that periodically collects encrypted logs and allows users to retrieve logs on demand for auditing purposes. The framework aims to enable data owners to track how their data is used while maintaining lightweight and decentralized logging.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
This document proposes the Cloud Information Accountability (CIA) framework to address issues of data protection and user control in cloud computing. The CIA framework uses a decentralized, object-centered approach to automatically log all access to user data in the cloud. It includes logger and log harmonizer components that are strongly coupled with user data to track usage according to access and usage control policies. This logging mechanism provides end-to-end accountability across the complex cloud service chain in a platform-independent and highly distributed manner, allowing users to audit their data usage and enforce protections when needed.
The document proposes a Cloud Information Accountability (CIA) framework to address concerns about lack of control and transparency when data is stored in the cloud. The CIA framework uses a novel logging and auditing technique that automatically logs any access to user data in a decentralized manner. It allows data owners to track how their data is being used according to service agreements or policies. The framework has two major components: a logger that is strongly coupled with user data, and a log harmonizer. The CIA framework aims to provide transparency, enforce access controls, and strengthen user control over their cloud data.
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
The document proposes a system for ensuring distributed accountability and security for user data stored in the cloud. The system encrypts user data and wraps it in a JAR file along with access policies. It uses DES for encryption, RSA for JAR file security, and MD5 for authentication. Log records of access are generated, encrypted, and stored in log files. A log harmonizer tracks the logs and can push or pull them to ensure the data owner's data is secure. The system aims to provide accountability, enforce access controls, and prevent attacks like copying or disassembling protected data.
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
The document proposes a decentralized technique called the CAI framework to automatically log any access to data stored in the cloud. This framework uses Java archive (JAR) files to log data access and provide an auditing mechanism. It includes algorithms for identity-based encryption and authentication as well as push and pull modes for generating log records. The system architecture involves multiple server systems running software like Tomcat and MySQL to provide the cloud logging functionality.
Ensuring Distributed Accountability in the CloudSuraj Mehta
This document outlines a project to ensure distributed accountability for data sharing in the cloud. It discusses the existing centralized system and outlines the proposed decentralized system with distributed accountability and automatic logging. The document includes sections on future scope, product features like JAR creation and data policies, an overview, security measures for copying and man-in-the-middle attacks, and technical specifications. It concludes that the goal of distributed accountability based on user privilege levels was achieved.
Ensuring distributed accountability for data sharing in the cloudSathya Moorthy
The document proposes a Cloud Information Accountability (CIA) framework to provide end-to-end accountability for data sharing in the cloud. The CIA framework uses a decentralized logging mechanism coupled with the user's data to automatically log all access. It also includes distinct push and pull modes for auditing, where logs are periodically sent or can be retrieved by the user. The implementation involves major components of loggers that record access and a log harmonizer that allows user access to the logs.
Distributed accountability for data sharing in cloudChanakya Chandu
The document proposes a Cloud Information Accountability (CIA) framework to provide end-to-end accountability for data stored in the cloud. The CIA framework uses a logger component associated with each user's data to log all access and encrypt the logs. It also includes a log harmonizer that periodically collects encrypted logs and allows users to retrieve logs on demand for auditing purposes. The framework aims to enable data owners to track how their data is used while maintaining lightweight and decentralized logging.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
This document discusses the potential value of cloud computing for companies. It predicts that within the next year, companies will push for at least one on-demand application to save money. While initially aimed at cost savings, cloud computing can improve collaboration, security, scalability and access. The document then provides examples of four organizations that achieved significant cost savings and productivity gains by adopting Google Apps, a cloud computing solution. These organizations included a technology services provider, retailer, newspaper publisher and city government.
How to customize a smart response mulitple choice quiz template by hillingLanelle Hilling
How to customize a smart response multiple choice quiz template. How to set answers and number of questions for use with the Smart Response Software, part of the Smart Notebook software suite.
El documento describe cómo la mayoría de la población argentina vive en centros urbanos cerca de cursos de agua, lo que los hace vulnerables a las inundaciones. A pesar del aumento en la frecuencia de precipitaciones extremas en las últimas dos décadas, Argentina no ha logrado adaptarse completamente ni mejorar su sistema de alerta y emergencias. La conciencia colectiva sobre este problema solo se registra cuando eventos extremos causan daños significativos.
Personal Mastery is a set of practices that support people in keeping their dreams whole while also cultivating an awareness of their current reality. This creates a tension between what one has and what one wants that naturally seeks resolution, so children try to move reality closer to their dreams.
Este documento discute la obesidad como un problema de salud mundial creciente. Explica que la obesidad causa problemas de salud y aumenta los costos médicos. También influye negativamente en la autoestima y el rendimiento escolar. Además, las redes sociales pueden contribuir a la diseminación de la obesidad al influir los amigos y familiares en el peso de los demás. Finalmente, presenta estadísticas que muestran altas tasas de obesidad en países como Estados Unidos, Alemania y algunos países de Amé
Este documento describe una actividad didáctica para estudiantes de 4o de ESO sobre la creación de un magazine de televisión utilizando la música. Los estudiantes trabajarán en grupos para desarrollar el guión de un magazine que incluya una sintonía, entrevistas, anuncios publicitarios y un coloquio, eligiendo la música apropiada. Luego representarán sus magazines para que sean evaluados por los compañeros basándose en el uso de la música y otros aspectos como la creatividad y el trabajo en equipo.
1) A ação trata de irregularidades em convênio celebrado entre o Município de Porto Velho e o Centro Educacional Mojuca em 2005, que beneficiou o demandado Edson Silveira.
2) Verificou-se lesão ao patrimônio público, uma vez que alguns alunos bolsistas da Secretaria Municipal de Educação também estavam matriculados no Centro Educacional Mojuca.
3) Conclui-se que houve ofensa ao princípio da impessoalidade e desvio de finalidade no convên
O Partido dos Trabalhadores representou Dirlaine e Ivone Cassol por propaganda irregular em cavaletes sem indicar a coligação e partidos. O juiz concedeu liminar para retirada dos cavaletes em 24 horas sob pena de multa diária de R$1.000,00, notificou as representadas e remeteu o processo ao Ministério Público Federal.
El documento describe diferentes medios de transmisión de señales, incluyendo cable coaxial, par trenzado, cable Ethernet, fibra óptica, microondas, infrarrojo y satélite. Cada medio se caracteriza por su capacidad de transmisión, alcance, ancho de banda, costo y otras propiedades relevantes para su uso en comunicaciones y redes de datos.
Electrons and chemical bonding spring 2014 day 2jmori
The document provides instructions for students to complete a STAR quiz and worksheet on chemical bonding. It includes the following key points:
1) Students need materials like a pencil, periodic table, and colored pencils for the worksheet.
2) They must turn in STAR cards and will be assigned a computer to continue the worksheet after the quiz.
3) The worksheet involves drawing Lewis dot diagrams, identifying ionic and covalent bonds, and calculating electronegativity.
4) Homework on ionic and covalent bonding is due next week along with completed STAR cards.
This document proposes the Cloud Information Accountability (CIA) framework to address issues of data protection and user control in cloud computing. The CIA framework uses a decentralized, object-centered approach to automatically log all access to user data in the cloud. It includes logger and log harmonizer components that are strongly coupled with user data to track usage and ensure policies are followed. This framework allows data owners to audit data usage and enforce protections. The proposed approach aims to provide accountability and strengthen user control in cloud environments.
This document proposes the Cloud Information Accountability (CIA) framework to address issues of data protection and user control in cloud computing. The CIA framework uses a decentralized, object-centered approach to automatically log all access to user data in the cloud. It includes logger and log harmonizer components that are strongly coupled with user data to track usage according to access and usage control policies. This logging mechanism provides end-to-end accountability across the complex cloud service chain in a platform-independent and highly distributed manner, allowing users to audit their data usage and enforce protections when needed.
This document discusses the potential value of cloud computing for companies. It predicts that within the next year, companies will push for at least one on-demand application to save money. While initially aimed at cost savings, cloud computing can improve collaboration, security, scalability and access. The document then provides examples of four organizations that achieved significant cost savings and productivity gains by adopting Google Apps, a cloud computing solution. These organizations included a technology services provider, retailer, newspaper publisher and city government.
How to customize a smart response mulitple choice quiz template by hillingLanelle Hilling
How to customize a smart response multiple choice quiz template. How to set answers and number of questions for use with the Smart Response Software, part of the Smart Notebook software suite.
El documento describe cómo la mayoría de la población argentina vive en centros urbanos cerca de cursos de agua, lo que los hace vulnerables a las inundaciones. A pesar del aumento en la frecuencia de precipitaciones extremas en las últimas dos décadas, Argentina no ha logrado adaptarse completamente ni mejorar su sistema de alerta y emergencias. La conciencia colectiva sobre este problema solo se registra cuando eventos extremos causan daños significativos.
Personal Mastery is a set of practices that support people in keeping their dreams whole while also cultivating an awareness of their current reality. This creates a tension between what one has and what one wants that naturally seeks resolution, so children try to move reality closer to their dreams.
Este documento discute la obesidad como un problema de salud mundial creciente. Explica que la obesidad causa problemas de salud y aumenta los costos médicos. También influye negativamente en la autoestima y el rendimiento escolar. Además, las redes sociales pueden contribuir a la diseminación de la obesidad al influir los amigos y familiares en el peso de los demás. Finalmente, presenta estadísticas que muestran altas tasas de obesidad en países como Estados Unidos, Alemania y algunos países de Amé
Este documento describe una actividad didáctica para estudiantes de 4o de ESO sobre la creación de un magazine de televisión utilizando la música. Los estudiantes trabajarán en grupos para desarrollar el guión de un magazine que incluya una sintonía, entrevistas, anuncios publicitarios y un coloquio, eligiendo la música apropiada. Luego representarán sus magazines para que sean evaluados por los compañeros basándose en el uso de la música y otros aspectos como la creatividad y el trabajo en equipo.
1) A ação trata de irregularidades em convênio celebrado entre o Município de Porto Velho e o Centro Educacional Mojuca em 2005, que beneficiou o demandado Edson Silveira.
2) Verificou-se lesão ao patrimônio público, uma vez que alguns alunos bolsistas da Secretaria Municipal de Educação também estavam matriculados no Centro Educacional Mojuca.
3) Conclui-se que houve ofensa ao princípio da impessoalidade e desvio de finalidade no convên
O Partido dos Trabalhadores representou Dirlaine e Ivone Cassol por propaganda irregular em cavaletes sem indicar a coligação e partidos. O juiz concedeu liminar para retirada dos cavaletes em 24 horas sob pena de multa diária de R$1.000,00, notificou as representadas e remeteu o processo ao Ministério Público Federal.
El documento describe diferentes medios de transmisión de señales, incluyendo cable coaxial, par trenzado, cable Ethernet, fibra óptica, microondas, infrarrojo y satélite. Cada medio se caracteriza por su capacidad de transmisión, alcance, ancho de banda, costo y otras propiedades relevantes para su uso en comunicaciones y redes de datos.
Electrons and chemical bonding spring 2014 day 2jmori
The document provides instructions for students to complete a STAR quiz and worksheet on chemical bonding. It includes the following key points:
1) Students need materials like a pencil, periodic table, and colored pencils for the worksheet.
2) They must turn in STAR cards and will be assigned a computer to continue the worksheet after the quiz.
3) The worksheet involves drawing Lewis dot diagrams, identifying ionic and covalent bonds, and calculating electronegativity.
4) Homework on ionic and covalent bonding is due next week along with completed STAR cards.
This document proposes the Cloud Information Accountability (CIA) framework to address issues of data protection and user control in cloud computing. The CIA framework uses a decentralized, object-centered approach to automatically log all access to user data in the cloud. It includes logger and log harmonizer components that are strongly coupled with user data to track usage and ensure policies are followed. This framework allows data owners to audit data usage and enforce protections. The proposed approach aims to provide accountability and strengthen user control in cloud environments.
This document proposes the Cloud Information Accountability (CIA) framework to address issues of data protection and user control in cloud computing. The CIA framework uses a decentralized, object-centered approach to automatically log all access to user data in the cloud. It includes logger and log harmonizer components that are strongly coupled with user data to track usage according to access and usage control policies. This logging mechanism provides end-to-end accountability across the complex cloud service chain in a platform-independent and highly distributed manner, allowing users to audit their data usage and enforce protections when needed.
The document proposes a Cloud Information Accountability (CIA) framework to provide accountability in cloud computing. The CIA framework uses a decentralized, automatic logging mechanism to track data access and usage in the cloud. It includes a logger that is strongly coupled with user data and can enforce access and usage policies. The CIA also features a log harmonizer that collects logs periodically and allows users to audit how their data is being used and ensure service agreements are being followed. The goal is to increase trust for cloud users by giving them greater visibility and control over their data.
The document proposes a Cloud Information Accountability (CIA) framework to address issues of lack of trust and compliance in cloud computing. The CIA framework uses a decentralized, object-centered approach to automatically log all access to user data in the cloud. Logs are sent periodically to data owners to provide transparency into how their data is being used. The proposed system aims to give data owners greater control and visibility over their data when stored in the cloud.
The document proposes a Cloud Information Accountability (CIA) framework to provide accountability in cloud computing. The CIA framework uses a decentralized, automatic logging mechanism to track data access and usage in the cloud. It includes a logger that is strongly coupled with user data and can enforce access and usage policies. The CIA also features a log harmonizer that collects logs periodically and allows users to audit how their data is being used and ensure service agreements are being followed. The document argues this approach provides transparency and control for users while their data is stored in the cloud.
Accountability in Distributed Environment For Data Sharing in the CloudEditor IJCATR
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis.
A major feature of the cloud services is that users‘ data are usually processed remotely in unknown machines that users do
not own or operate. While enjoying the convenience brought by this new emerging technology, users‘ fears of losing control
of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud
services. To address this problem, in this paper, we propose a novel highly decentralized information accountability
framework to keep track of the actual usage of the users ‗data in the cloud. In particular, we propose an object-centred
approach that enables enclosing our logging mechanism together with users‘ data and policies. We leverage the JAR
programmable capabilities to both create a dynamic and travelling object, and to ensure that any access to users‘ data will
trigger authentication and automated logging local to the JARs. To strengthen user‘s control, we also provide distributed
auditing mechanisms
This document discusses data sharing in the cloud using distributed accountability. It proposes a Cloud Information Accountability (CIA) framework to provide end-to-end accountability in a highly distributed manner. The CIA framework uses an object-centered approach that enables automatic logging mechanisms to be enclosed with user data and policies. This improves security and privacy of data in the cloud. It also provides distributed auditing mechanisms and a secure Java virtual machine (JVM) for high security. The framework is evaluated against potential attacks like disassembly attacks and man-in-the-middle attacks to demonstrate its effectiveness.
This document discusses data sharing in the cloud using distributed accountability. It proposes a Cloud Information Accountability (CIA) framework to provide end-to-end accountability and transparency in data usage in cloud environments. The framework uses a logger and log harmonizer to automatically log all access to user data stored in JAR files. It also implements a secure JVM and techniques like oblivious hashing and obfuscated code to strengthen security and integrity. The framework allows data owners to monitor how their data is handled in the cloud according to usage policies in a distributed manner without heavy overhead. It evaluates the framework against attacks like disassembling and man-in-the-middle attacks.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The document proposes a Session Based Ciphertext Policy Attribute Based Encryption (SB-CP-ABE) method for access control in cloud storage. SB-CP-ABE aims to enable efficient key refreshing and revocation in ciphertext policy attribute based encryption (CP-ABE) schemes. It introduces the concept of associating private keys with sessions, so that key updates and revocations only need to be done at session boundaries, avoiding the need for frequent re-encryption of ciphertexts. The method can be generically applied to existing CP-ABE schemes to improve their practicality for cloud storage environments.
The document proposes a novel Cloud Information Accountability (CIA) framework to provide distributed accountability for data sharing in the cloud. The CIA framework uses a decentralized, object-centered approach that binds logging mechanisms to users' data and policies through Java Archive (JAR) files. This allows any access to user data to automatically trigger authenticated logging. The framework provides users with control and transparency over how their data is used according to service level agreements. Experimental results demonstrate the efficiency and effectiveness of the CIA framework.
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
Abstract Cloud computing provides much-known services for storing user data over cloud server and it provides attention towards a broad set of technologies, rules and controls deployed to provide security for applications and data. As the more and more firm uses the cloud, security in cloud environment is becoming very important issue. It is much needed that companies should work with partners doing best practices of cloud security and which facilitate transparency for their solutions. Number of security solutions today depends on the authentication for security but it did not provide solution for the privacy problems while sharing data in the cloud environment. Data access request from the user itself may expose users’ private data no matter his request approved or not. So this becomes very important in sharing data in the cloud environment. In this paper we proposed a system which provides attention towards the above mentioned problem. In proposed system we used the concept of data anonymity for sending data access request to data owner and also provide the data auditing facility to detect fraud in the integrity of users shared data. Keywords: Cloud computing, privacy preservation, data integrity, data sharing, authentication
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
In cloud computing applications, users’ data and applications are hosted by cloud providers. With internet and cloud availability increasing numbers of people are storing their content on cloud. Also with presence of social networking, contents stored on cloud are also shared. This requires more security for the contents on cloud. Traditional security solution address only encryption, decryption of data on cloud and its access control , but with this new trend of sharing, the scope of security becomes even higher. In this paper we propose a solution of integrated access control for contents shared on cloud and its efficient revocation.
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
This document proposes a new technique called Storage Correctness and Small-grained Access Provision (SCSAP) for secure cloud computing environments. SCSAP aims to improve on existing access control techniques by providing more fine-grained user access and ensuring correctness of outsourced cloud data storage through a token granting system. The technique constructs hierarchical user access formations and includes algorithmic phases for small-grained data access and efficient storage. If implemented, SCSAP could provide stronger security, access control and data integrity than prior cloud storage solutions.
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
This document proposes a Shared Authority based Privacy preserving Authentication protocol (SAPA) for handling privacy issues in cloud storage. SAPA achieves shared access authority through an anonymous access request matching mechanism. It applies attribute-based access control to allow users to reliably access their own data fields. It also uses proxy re-encryption to provide temporary authorized data sharing among multiple users. The goal is to preserve user privacy during data access and sharing in the cloud.
Security Check in Cloud Computing through Third Party Auditorijsrd.com
In cloud computing, data owners crowd their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, it requires an independent auditing service to check the data integrity in the cloud. Some existing remote integrity checking method scan only serve for static records data. Thus, cannot be used in the auditing service since the data in the cloud can be animatedly updated. Thus, an efficient and secure dynamic auditing protocol is required to convince data owners that the data are correctly stored in the cloud. In this paper, we first design an auditing framework for cloud storage systems for privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient to secure the random model.
Security Check in Cloud Computing through Third Party Auditor
Pp1t
1. INTRODUCTION:INTRODUCTION:
CLOUD computing presents a new way to supplement the current
consumption and delivery model for IT services based on the
Internet.
While enjoying the convenience brought by this new technology,
users also start worrying about losing control of their own data.
In the context of cloud, accountability is a set of approaches to
addresses two key problems:
Lack of consumer trust in cloud service providers
Difficulty faced by cloud service providers with compliance
across geographic boundaries
Emphasis is on data protection, but the notion of accountability
encompasses more than just privacy
2. ABSTRACT:ABSTRACT:
Though the Cloud Service Provider (CSP) gives the privacy and
integrity of the data, this tracks the actual usage of the user’s data
in the cloud by using novel highly decentralized framework data
and policies
An object-centered approach that enables enclosing our logging
mechanism together with users’ data and policies.
By leverageing the JAR programmable capabilities to both create a
dynamic and traveling object.
To strengthen user’s control, also provide distributed auditing
mechanisms.
3. EXISTING SYSTEM:EXISTING SYSTEM:
Data handling can be outsourced by the direct cloud service
provider (CSP) to other entities in the cloud and theses entities can
also delegate the tasks to others, and so on.
Entities are allowed to join and leave the cloud in a flexible manner.
As a result, data handling in the cloud goes through a complex and
dynamic hierarchical service chain which does not exist in
conventional environments
No log and JAR files created for this system
Data in the cloud may be of encrypted form
4. PROPOSED SYSTEM:PROPOSED SYSTEM:
As the cloud provider gives the access of the resources to the
cloud user’s, the data owner keeps track of usage of their
resources.
It also provides authenticated usage of data in the cloud.
Proposed CIA framework provides end-to end accountability in a
highly distributed fashion..
By means of the CIA, data owners can track not only whether or
not the service-level agreements.
5. Advantage Of Proposed System:
Novel automatic and enforceable logging mechanism in the cloud.
Proposed architecture is platform independent and highly
decentralized, in that it does not require any dedicated
authentication or storage system in place.
Provide a certain degree of usage control for the protected data
after these are delivered to the receiver
The results demonstrate the efficiency, scalability, and granularity
of our approach. We also provide a detailed security analysis and
discuss the reliability and strength of our architecture.
6. Literature Survey
1.Toward Publicly Auditable Secure Cloud Data Storage
Services
The authors propose that publicly auditable cloud data storage is
able to help this nascent cloud economy become fully established.
With public auditability, a trusted entity with expertise and
capabilities data owners do not possess can be delegated as an
external audit party to assess the risk of outsourced data when
needed.
Such an auditing service not only helps save data owners’
computation resources but also provides a transparent yet cost-
effective method for data owners to gain trust in the cloud. The
author describe approaches and system requirements that should
be brought into consideration, and outline challenges that need to
be resolved for such a publicly auditable secure cloud storage
service to become a reality
7. 2.Identity-Based Authentication for Cloud Computing
The authors propose an identity-based encryption (IBE) and
decryption and identity-based signature (IBS) schemes for
IBHMCC. based on the former IBE and IBS schemes, an
identitybased authentication for cloud computing (IBACC) is
proposed.The author presented an identity based authentication
for cloudcomputing, based on the identity-based hierarchical
model for cloud computing (IBHMCC) and corresponding
encryption and signature schemes
3.Online data storage using implicit security
The authors have described an implicit security architecture
suited for the application of online storage. In this scheme data is
partitioned in such a way that each partition is implicitly secure and
does not need to be encrypted. These partitions are stored on
different servers on the network which are known only to the
user. Reconstruction of the data requires access to each server
and the knowledge as to which servers the data partitions are
stored..
8. HARDWARE REQUIREMENTSHARDWARE REQUIREMENTS::
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Mouse : Logitech.
Ram : 512 Mb.
SOFTWARE REQUIREMENTS:SOFTWARE REQUIREMENTS:
Operating System : Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java, Jsp
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database : Mysql 5.0
Database Connectivity : JDBC.
10. MODULES:MODULES:
1. Cloud Information Accountability (CIA) Framework
2. Distinct mode for auditing:
3. Logging and auditing Techniques .
4. Components of CIA
11. MODULES:MODULES:
1. Cloud Information Accountability (CIA)
Framework:
CIA framework lies in its ability of maintaining lightweight and
powerful accountability.
By means of the CIA, data owners can track not only whether or
not the service-level agreements are being honored, but also
enforce access and usage control rules as needed.
12. 2. Distinct mode for auditing:
Push mode:
The push mode refers to logs being periodically sent to the data
owner or stakeholder.
Pull mode:
Pull mode refers to an alternative approach whereby the user
(Or another authorized party) can retrieve the logs as needed.
13. 3. Logging and auditing Techniques:
1. The logging should be decentralized in order to adapt to the
dynamic nature of the cloud..
2. Every access to the user’s data should be correctly and
automatically logged.
3. Log files should be reliable and tamper proof to avoid illegal
insertion, deletion, and modification by malicious parties.
4. Log files should be sent back to their data owners periodically to
inform them of the current usage of their data.
5. The proposed technique should not intrusively monitor data
recipients’ systems.
14. 4. Major components of CIA:
There are two major components of the CIA, the first being the
logger, and the second being the log harmonizer.
The logger is strongly coupled with user’s data (either single or
multiple data items).
It may also be configured to ensure that access and usage control
policies associated with the data are honored.
15. CONCLUSIONCONCLUSION
Innovative approaches for automatically logging any access to the
data in the cloud together with an auditing mechanism is proposed.
Approach allows the data owner to not only audit his content but
also enforce strong back-end protection if needed. Moreover, one
of the main features of our work is that it enables the data owner
to audit even those copies of its data that were made without his
knowledge.
In the future, planed to refine our approach to verify the integrity
and the authentication of JARs