SlideShare a Scribd company logo
The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 12 || December - 2014 || Pages || 33-38||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 32
Two Level Auditing Architecture to Maintain Consistent In
Cloud
Deepak Batta1
, P.Srinivasan2
1
ME-CSE (Final year), Muthayammal Engineering College, Rasipuram
2
Assistant professor, Muthayammal Engineering College, Rasipuram
------------------------------------------------------ABSTRACT---------------------------------------------------
Confidential data in an enterprise may be illegally accessed through a remote interface provided by a multiple-
cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain
storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers (CSPs) to provide
security techniques for managing their storage services. To overcome these problems we present a Consistency
as a service auditing cloud scheme. We prove the security of our scheme based data fragmentation on multiple
clouds. So the proposed system has data fragmentation, data security and storage on multiple cloud services.
We used trusted third party to store the data on multiple cloud and find the data access by untrusted cloud
service providers. In this system the client data divide into multiple pieces and send to the multiple clouds with
help of trusted third party. If any of the untrusted cloud service providers try modify the data the alert will send
to trusted third party about illegal access of untrusted cloud service provider.
--------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 12 December 2014 Date of Accepted: 05 January 2015
-------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cloud computing has become commercially popular ,as it promises to guarantee scalability, elasticity,
and high availability at a low cost , the trend of the everything-as-a-service (XaaS) model, data storages
,virtualized infrastructure, virtualized platforms, as well as software and applications are being provided and
consumed as services in the cloud. Cloud storage services can be regarded as a typical service in cloud
computing, which involves the delivery of data storage as a service, including data base like services and
network attached storage, often billed on a utility computing basis, e.g., per gigabyte per month. Examples
include Amazon SimpleDB1, Microsoft Azure storage2, and so on. The usage of the cloud storage services, the
customers can access data stored in a cloud anytime and anywhere using any device, without caring about a
large amount of capital investment when deploying the underlying hardware infrastructures. To meet the
promise of ubiquitous 24/7 access, the cloud service provider (CSP) stores data replicas on multiple
geographically distributed servers. A key problem of using the replication technique in clouds is that it is very
expensive to achieve strong consistency on a worldwide scale, where a user is ensured to see the latest updates.
Actually, mandated by the CAP principle3, many CSPs (e.g., Amazon S3) only ensure weak consistency, such
as eventual consistency, for performance and high availability, where a user can read stale data for a period of
time. The domain name system (DNS) is one of the most popular applications that implement eventual
consistency. Updates to name will not be visible immediately, but all clients are ensured to see them eventually.
Fig. 1.1: An application requires casual consistency
However, eventual consistency is not a catholicon for all applications. Especially for the interactive
applications, stronger consistency assurance is of increasing importance. Consider the following scenario as
shown in Fig. 1. Suppose that Alice and Bob are cooperating on a project using a cloud storage service, where
all of the related data is replicated to five cloud servers, CS1, . . ., CS5. After uploading a new version of there
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 33
requirement analysis to a CS4, Alice calls Bob to download the latest version for integrated design. Here, after
Alice calls Bob, the causal relationship [5] is established between Alice’s update and Bob’s read. Therefore, the
cloud should provide causal consistency, which ensures that Alice’s update is committed to all of the replicas
before Bob’s read. In this case, the integrated design that is based on an old version may not satisfy the real
requirements of customers. Actually, different applications have different consistency requirements.
II. RELATED WORK
In “A VIEW OF CLOUD COMPUTING” paper the author proposed the Private-key storage e
outsourcing allows clients with either limited resources or limited expertise to store and distribute large amounts
of symmetrically encrypted data at low cost. Since regular private-key encryption prevents one from searching
over encrypted data, clients also lose the ability to selectively retrieve segments of their data. To address this,
several techniques have been proposed for provisioning symmetric encryption with search capabilities the
resulting construct is typically called searchable encryption. The area of searchable encryption has been
identified by DARPA as one of the technical advances that can be used to balance the need for both privacy and
national security in information aggregation systems. One approach to provisioning symmetric encryption with
search capabilities is with a so-called secure index. An index is a data structure that stores document collections
while supporting efficient keyword search, i.e., given a keyword, the index returns a pointer to the documents
that contain it. Informally, an index is secure" if the search operation for a keyword w can only be performed by
users that possess a trapdoor" for w and if the trapdoor can only be generated with a secret key. Without
knowledge of trapdoors, the index leaks no information about its contents. one can build a symmetric searchable
encryption scheme from a secure index as follows: the client indexes and encrypts its document collection and
sends the secure index together with the encrypted data to the server. To search for a keyword w, the client
generates and sends a trapdoor for w which the server uses to run the search operation and recover pointers to
the appropriate (encrypted) documents.
Symmetric searchable encryption can be achieved in its full generality and with optimal security
using the work of oblivious RAMs. More precisely, using these techniques any type of search query can be
achieved (e.g., conjunctions or disjunctions of keywords) without leaking any information to the server, not
even the access pattern" (i.e., which documents contain the keyword). This strong privacy guarantee, however,
comes at the cost of a logarithmic (in the number of documents) number of rounds of interaction for each read
and write. In the same paper, the authors show a 2-round solution, but with considerably larger square-root
overhead. Therefore, the previously mentioned work on searchable encryption tries to achieve more efficient
solutions (typically in one or two rounds) by weakening the privacy guarantees.
The System introduces new adversarial models for SSE. The first, which we refer to as non-adaptive,
only considers adversaries that make their search queries without taking into account the trapdoors and search
outcomes of previous searches. The second |adaptive| considers adversaries that choose their queries as a
function of previously obtained trapdoors and search outcomes. All previous work on SSE (with the exception
of oblivious RAMs) falls within the non-adaptive setting. The implication is that, contrary to the natural use of
searchable encryption described in these definitions only guarantee security for users that perform all their
searches at once. System addresses this by introducing game-based and simulation-based definitions in the
adaptive setting.In analyzing consistency properties forfun and profit paper the author proposed the system
consider the following distributed file system: a user U pays a server S for storage service, with the goal being
that U can retrieve the stored ¯les anytime and anywhere through Internet connections. For example, U may
store files containing personal data that U may want to later access using his wireless PDA. A user might be
willing to pay for such a service in order to have access to data without carrying devices with large amount of
memory, and to have the data well-maintained by professionals. Such distributed file services already exist, such
as the Yahoo! Briefcase".1 The system expect such services will grow with the expansion of mobile and
pervasive computing. In many cases U will not want to reveal the contents of his files to S in order to maintain
security or privacy. It follows that the files will often be stored in encrypted form. Suppose, however, that later
U wants to retrieve files based on a keyword search. That is, U wants to retrieve ¯les containing (or indexed by)
some keyword. If the files are encrypted, there is no straightforward way for S to do keyword search unless U is
willing to leak the decryption key. A trivial solution that preserves the security of U's files is to have S send all
the encrypted files back to him. This may not be a feasible solution if U is using mobile devices with limited
bandwidth and storage space. An additional complication is that U may naturally also want to keep secret the
keyword that he is interested in as well.
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 34
Data-centric consistency : Data-centric consistency model considers the internal state of a storage system,
i.e., how updates flow through the system and what guarantees the system can provide with respect to updates.
However, to a customer, it really does not matter whether or not a storage system internally contains any stale
copies. As long as no stale data is observed from the client’s point of view, the customer is satisfied.
Client-centric consistency : Client-centric consistency model concentrates on what specific customers want,
i.e., how the customers observe data updates. Their work also describes different levels of consistency in
distributed systems, from strict consistency to weak consistency. High consistency implies high cost and
reduced availability. the states that strict consistency is never needed in practice, and is even considered harmful
III. EXISTING METHODOLOGY
There exist various tools and technologies for multiple cloud, such as Platform VM Orchestrator,
Vmware vSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform
(DCSP) for managing clients’ data. However, if such an important platform is vulnerable to security attacks, it
would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be
illegally accessed through a remote interface provided by a multiple-cloud, or relevant data and archives may be
lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is
indispensable for cloud service providers (CSPs) to provide security techniques for managing their storage
services.
DISADVANTAGES
 Untrusted clouds.
 Full data in all cloud.
 Low level security.
 Need more data space.
 Cloud provider can access client's data.
IV. PROPOSED SYSTEM
We present a Consistency as a service auditing cloud scheme. We prove the security of our scheme
based data fragmentation on multiple clouds. So the proposed system has data fragmentation, data security and
storage on multiple cloud services. We used trusted third party to store the data on multiple cloud and find the
data access by untrusted cloud service providers. In this system the client data divide into multiple pieces and
common secret key, send to the multiple clouds with help of trusted third party. If any of the untrusted cloud
service providers try modify the data the alert will send to trusted third party about illegal access of untrusted
cloud service provider.
TTP (TRUSTED THIRD PARTY)
Log In : Here TTP has to log in by using their unique user name and password. TTP is the only authorized
person to access TTP module for security purpose. So others don’t get rights to access this module.
Transfer : In this module TTP view the client uploaded file and transfer them into multiple-cloud. The file will
split into 3 pieces and stored in cloud. TTP is the only authorized person to access TTP module for security
purpose. So others don’t get rights to access this module.
View : In this module TTP view the client uploaded file from multiple-cloud. TTP is the only authorized person
to access TTP module for security purpose. So others don’t get rights to access this module.
Alerts : In this module TTP view the alerts of the security issues of client uploaded files in cloud. That is if any
of CSP try to access client file the alert will send to TTP. TTP is the only authorized person to access ttp
module for security purpose. So others don’t get rights to access this module.
CSP (CLOUD SERVICE PROVIDER)
Log In : Here CSP has to log in by using their unique user name and password. CSP is the only authorized
person to access CSP module for security purpose. So others don’t get rights to access this module.
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 35
View :In this module CSP view the client uploaded file in their cloud as encrypted format. If CSP try edit the
client file the alert will send to TTP. CSP is the only authorized person to access TTP module for security
purpose. So others don’t get rights to access this module.
CLIENT
Register : Here client has to register their details to log In. It contains unique user name and password. Client is
the only authorized person to access this module for security purpose. So others don’t get rights to access this
module.
Log In : Here client has to log in by using their unique user name and password after registration. Client is the
only authorized person to access this module for security purpose. So others don’t get rights to access this
module.
Upload : In this module client upload their files means give to the correct secret key. The secret key is wrong
means the file is not uploaded. And also enter the expire date. That date only visible the file in cloud. Client is
the only authorized person to access this module for security purpose. So others don’t get rights to access this
module.
View : In this module client view their uploaded file from multiple-cloud. Client can edit the particular split.
The updates will changed on cloud. Client is the only authorized person to access this module for security
purpose. So others don’t get rights to access this module.
Download : In this module client download their files means give to the correct secret key. The secret key is
wrong means the file is not download. Particular date only client download the upload files.. Client is the only
authorized person to access this module for security purpose. So others don’t get rights to access this module.
ADVANTAGES
 Trusted third party.
 Incomplete data in all cloud.
 Security alerts, encryption data.
 Need low data space.
 Cloud provider can't accessing client's data.
V. DATAFLOW DIAGRAM
LEVEL 0:
LEVEL 1:
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 36
LEVEL2:
LEVEL 3:
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 37
VI. ALGORITHM USED
LOCAL CONSISTENCY AUDITING
Local consistency auditing is an online algorithm (Alg. 1). In Alg. 1, each user will record all of his
operations in his UOT. While issuing a read operation, the user will perform local consistency auditing
independently. Let R(a) denote a user’s current read whose dictating write is W(a), W(b) denote the last write in
the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c). Read-your-write consistency
is violated if W(a) happens before W(b), and monotonic-read consistency is violated if W(a) happens before
W(c). Note that, from the value of a read, we can know the logical vector and physical vector of its dictating
write. Therefore, we can order the dictating writes by their logical vectors.
 Initial UOT with ∅
 while issue an operation op do
 if op = W(a) then
 record W(a) in UOT
 if op = r(a) then
 W(b) ∈ UOT is the last write
 if W(a) → W(b) then
 Read-your-write consistency is violated
 R(c) ∈ UOT is the last read
 if W(a) → W(c) then
 Monotonic-read consistency is violated
 record r(a) in UOT
GLOBAL CONSISTENCY AUDITING : Local consistency auditing is an online algorithm (Alg. 1). In Alg.
1, each user will record all of his operations in his UOT. While issuing a read operation, the user will perform
local consistency auditing independently. Let R(a) denote a user’s current read whose dictating write is W(a),
W(b) denote the last write in the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c).
Read-your-write consistency is violated if W(a) happens before W(b), and monotonic-read consistency is
violated if W(a) happens before W(c). Note that, from the value of a read, we can know the logical vector and
physical vector of its dictating write. Therefore, we can order the dictating writes by their logical vectors.
 Each operation in the global trace is denoted by a vertex
 for any two operations op1 and op2 do
 if op1 → op2 then
 A time edge is added from op1 to op2
 if op1 = W(a), op2 = R(a), and two operations come
 from different users then
 A data edge is added from op1 to op2
 if op1 = W(a), op2 = W(b), two operations come from
 different users, and W(a) is on the route from W(b) to
 R(b) then
 A causal edge is added from op1 to op2
 Check whether the graph is a DAG by topological sorting
VII. CONCLUSION
The system proposes a consistency as a service (CaaS) model and a two-level auditing structure to help
users verify whether the cloud service provider (CSP) is providing the promised consistency, and to quantify the
severity of the violations, if any. With the CaaS model, the users can assess the quality of cloud services and
choose a right CSP among various candidates, e.g., the least expensive one that still provides adequate
consistency for the users’ applications .For our future work, we will conduct a thorough theoretical study of
consistency models in cloud computing.
REFERENCES
[1] Qin Liu, Guojun Wang, , and Jie Wu “Consistency as a Service: Auditing Cloud Consistency “Ieee Transactions On Network
And Service Management Vol:11 No:1 Year 2014
[2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “A view of
cloud computing,” Commun. ACM, vol. 53, no. 4, 2010.
[3] P. Mell and T. Grance, “The NIST definition of cloud computing (draft),”NIST Special Publication 800-145 (Draft), 2011.
[4] E. Brewer, “Towards robust distributed systems,” in Proc. 2000 ACMPODC.
[5] “Pushing the CAP: strategies for consistency and availability,”Computer, vol. 45, no. 2, 2012.
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 38
[6] M. Ahamad, G. Neiger, J. Burns, P. Kohli, and P. Hutto, “Causal memory: definitions, implementation, and programming,”
Distributed Computing, vol. 9, no. 1, 1995.
[7] W. Lloyd, M. Freedman, M. Kaminsky, and D. Andersen, “Don’t settlefor eventual: scalable causal consistency for wide-area
storage witCOPS,” in Proc. 201 1 ACM SOSP.
[8] E. Anderson, X. Li, M. Shah, J. Tucek, and J. Wylie, “What consistencydoes your key-value store actually provide,” in Proc.
2010 USENIXHotDep.
[9] C. Fidge, “Timestamps in message-passing systems that preserve thepartial ordering,” in Proc. 1988 ACSC.
[10] W. Golab, X. Li, and M. Shah, “Analyzing consistency properties forfun and profit,” in Proc. 2011 ACM PODC.

More Related Content

What's hot

IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
 
Ppt 1
Ppt 1Ppt 1
E041212224
E041212224E041212224
E041212224
IOSR-JEN
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
LeMeniz Infotech
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
Venkat Projects
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
 
Final 1st
Final 1stFinal 1st
Final 1st
gokulprema
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 

What's hot (20)

IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
552 556
552 556552 556
552 556
 
E041212224
E041212224E041212224
E041212224
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
 
Final 1st
Final 1stFinal 1st
Final 1st
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 

Viewers also liked

Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
theijes
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphone
theijes
 
Coordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin KebbiCoordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin Kebbi
theijes
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
theijes
 
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
theijes
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...
theijes
 
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA AlgorithmAdaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
theijes
 
The First Idea of N-Aelads Technology
The First Idea of N-Aelads TechnologyThe First Idea of N-Aelads Technology
The First Idea of N-Aelads Technology
theijes
 
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
theijes
 
Implementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption StandardImplementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption Standard
theijes
 
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
theijes
 
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
theijes
 
Robotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly peopleRobotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly people
theijes
 
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
theijes
 
Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...
theijes
 
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide InsertsMachining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
theijes
 
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
theijes
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
theijes
 
Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...
theijes
 

Viewers also liked (19)

Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphone
 
Coordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin KebbiCoordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin Kebbi
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
 
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...
 
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA AlgorithmAdaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
 
The First Idea of N-Aelads Technology
The First Idea of N-Aelads TechnologyThe First Idea of N-Aelads Technology
The First Idea of N-Aelads Technology
 
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
 
Implementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption StandardImplementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption Standard
 
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
 
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
 
Robotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly peopleRobotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly people
 
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
 
Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...
 
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide InsertsMachining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
 
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
 
Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...
 

Similar to Two Level Auditing Architecture to Maintain Consistent In Cloud

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Editor IJMTER
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
El35782786
El35782786El35782786
El35782786
IJERA Editor
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
 

Similar to Two Level Auditing Architecture to Maintain Consistent In Cloud (20)

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
El35782786
El35782786El35782786
El35782786
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Two Level Auditing Architecture to Maintain Consistent In Cloud

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 12 || December - 2014 || Pages || 33-38|| ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 32 Two Level Auditing Architecture to Maintain Consistent In Cloud Deepak Batta1 , P.Srinivasan2 1 ME-CSE (Final year), Muthayammal Engineering College, Rasipuram 2 Assistant professor, Muthayammal Engineering College, Rasipuram ------------------------------------------------------ABSTRACT--------------------------------------------------- Confidential data in an enterprise may be illegally accessed through a remote interface provided by a multiple- cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers (CSPs) to provide security techniques for managing their storage services. To overcome these problems we present a Consistency as a service auditing cloud scheme. We prove the security of our scheme based data fragmentation on multiple clouds. So the proposed system has data fragmentation, data security and storage on multiple cloud services. We used trusted third party to store the data on multiple cloud and find the data access by untrusted cloud service providers. In this system the client data divide into multiple pieces and send to the multiple clouds with help of trusted third party. If any of the untrusted cloud service providers try modify the data the alert will send to trusted third party about illegal access of untrusted cloud service provider. -------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 12 December 2014 Date of Accepted: 05 January 2015 ------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Cloud computing has become commercially popular ,as it promises to guarantee scalability, elasticity, and high availability at a low cost , the trend of the everything-as-a-service (XaaS) model, data storages ,virtualized infrastructure, virtualized platforms, as well as software and applications are being provided and consumed as services in the cloud. Cloud storage services can be regarded as a typical service in cloud computing, which involves the delivery of data storage as a service, including data base like services and network attached storage, often billed on a utility computing basis, e.g., per gigabyte per month. Examples include Amazon SimpleDB1, Microsoft Azure storage2, and so on. The usage of the cloud storage services, the customers can access data stored in a cloud anytime and anywhere using any device, without caring about a large amount of capital investment when deploying the underlying hardware infrastructures. To meet the promise of ubiquitous 24/7 access, the cloud service provider (CSP) stores data replicas on multiple geographically distributed servers. A key problem of using the replication technique in clouds is that it is very expensive to achieve strong consistency on a worldwide scale, where a user is ensured to see the latest updates. Actually, mandated by the CAP principle3, many CSPs (e.g., Amazon S3) only ensure weak consistency, such as eventual consistency, for performance and high availability, where a user can read stale data for a period of time. The domain name system (DNS) is one of the most popular applications that implement eventual consistency. Updates to name will not be visible immediately, but all clients are ensured to see them eventually. Fig. 1.1: An application requires casual consistency However, eventual consistency is not a catholicon for all applications. Especially for the interactive applications, stronger consistency assurance is of increasing importance. Consider the following scenario as shown in Fig. 1. Suppose that Alice and Bob are cooperating on a project using a cloud storage service, where all of the related data is replicated to five cloud servers, CS1, . . ., CS5. After uploading a new version of there
  • 2. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 33 requirement analysis to a CS4, Alice calls Bob to download the latest version for integrated design. Here, after Alice calls Bob, the causal relationship [5] is established between Alice’s update and Bob’s read. Therefore, the cloud should provide causal consistency, which ensures that Alice’s update is committed to all of the replicas before Bob’s read. In this case, the integrated design that is based on an old version may not satisfy the real requirements of customers. Actually, different applications have different consistency requirements. II. RELATED WORK In “A VIEW OF CLOUD COMPUTING” paper the author proposed the Private-key storage e outsourcing allows clients with either limited resources or limited expertise to store and distribute large amounts of symmetrically encrypted data at low cost. Since regular private-key encryption prevents one from searching over encrypted data, clients also lose the ability to selectively retrieve segments of their data. To address this, several techniques have been proposed for provisioning symmetric encryption with search capabilities the resulting construct is typically called searchable encryption. The area of searchable encryption has been identified by DARPA as one of the technical advances that can be used to balance the need for both privacy and national security in information aggregation systems. One approach to provisioning symmetric encryption with search capabilities is with a so-called secure index. An index is a data structure that stores document collections while supporting efficient keyword search, i.e., given a keyword, the index returns a pointer to the documents that contain it. Informally, an index is secure" if the search operation for a keyword w can only be performed by users that possess a trapdoor" for w and if the trapdoor can only be generated with a secret key. Without knowledge of trapdoors, the index leaks no information about its contents. one can build a symmetric searchable encryption scheme from a secure index as follows: the client indexes and encrypts its document collection and sends the secure index together with the encrypted data to the server. To search for a keyword w, the client generates and sends a trapdoor for w which the server uses to run the search operation and recover pointers to the appropriate (encrypted) documents. Symmetric searchable encryption can be achieved in its full generality and with optimal security using the work of oblivious RAMs. More precisely, using these techniques any type of search query can be achieved (e.g., conjunctions or disjunctions of keywords) without leaking any information to the server, not even the access pattern" (i.e., which documents contain the keyword). This strong privacy guarantee, however, comes at the cost of a logarithmic (in the number of documents) number of rounds of interaction for each read and write. In the same paper, the authors show a 2-round solution, but with considerably larger square-root overhead. Therefore, the previously mentioned work on searchable encryption tries to achieve more efficient solutions (typically in one or two rounds) by weakening the privacy guarantees. The System introduces new adversarial models for SSE. The first, which we refer to as non-adaptive, only considers adversaries that make their search queries without taking into account the trapdoors and search outcomes of previous searches. The second |adaptive| considers adversaries that choose their queries as a function of previously obtained trapdoors and search outcomes. All previous work on SSE (with the exception of oblivious RAMs) falls within the non-adaptive setting. The implication is that, contrary to the natural use of searchable encryption described in these definitions only guarantee security for users that perform all their searches at once. System addresses this by introducing game-based and simulation-based definitions in the adaptive setting.In analyzing consistency properties forfun and profit paper the author proposed the system consider the following distributed file system: a user U pays a server S for storage service, with the goal being that U can retrieve the stored ¯les anytime and anywhere through Internet connections. For example, U may store files containing personal data that U may want to later access using his wireless PDA. A user might be willing to pay for such a service in order to have access to data without carrying devices with large amount of memory, and to have the data well-maintained by professionals. Such distributed file services already exist, such as the Yahoo! Briefcase".1 The system expect such services will grow with the expansion of mobile and pervasive computing. In many cases U will not want to reveal the contents of his files to S in order to maintain security or privacy. It follows that the files will often be stored in encrypted form. Suppose, however, that later U wants to retrieve files based on a keyword search. That is, U wants to retrieve ¯les containing (or indexed by) some keyword. If the files are encrypted, there is no straightforward way for S to do keyword search unless U is willing to leak the decryption key. A trivial solution that preserves the security of U's files is to have S send all the encrypted files back to him. This may not be a feasible solution if U is using mobile devices with limited bandwidth and storage space. An additional complication is that U may naturally also want to keep secret the keyword that he is interested in as well.
  • 3. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 34 Data-centric consistency : Data-centric consistency model considers the internal state of a storage system, i.e., how updates flow through the system and what guarantees the system can provide with respect to updates. However, to a customer, it really does not matter whether or not a storage system internally contains any stale copies. As long as no stale data is observed from the client’s point of view, the customer is satisfied. Client-centric consistency : Client-centric consistency model concentrates on what specific customers want, i.e., how the customers observe data updates. Their work also describes different levels of consistency in distributed systems, from strict consistency to weak consistency. High consistency implies high cost and reduced availability. the states that strict consistency is never needed in practice, and is even considered harmful III. EXISTING METHODOLOGY There exist various tools and technologies for multiple cloud, such as Platform VM Orchestrator, Vmware vSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform (DCSP) for managing clients’ data. However, if such an important platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed through a remote interface provided by a multiple-cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers (CSPs) to provide security techniques for managing their storage services. DISADVANTAGES  Untrusted clouds.  Full data in all cloud.  Low level security.  Need more data space.  Cloud provider can access client's data. IV. PROPOSED SYSTEM We present a Consistency as a service auditing cloud scheme. We prove the security of our scheme based data fragmentation on multiple clouds. So the proposed system has data fragmentation, data security and storage on multiple cloud services. We used trusted third party to store the data on multiple cloud and find the data access by untrusted cloud service providers. In this system the client data divide into multiple pieces and common secret key, send to the multiple clouds with help of trusted third party. If any of the untrusted cloud service providers try modify the data the alert will send to trusted third party about illegal access of untrusted cloud service provider. TTP (TRUSTED THIRD PARTY) Log In : Here TTP has to log in by using their unique user name and password. TTP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. Transfer : In this module TTP view the client uploaded file and transfer them into multiple-cloud. The file will split into 3 pieces and stored in cloud. TTP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. View : In this module TTP view the client uploaded file from multiple-cloud. TTP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. Alerts : In this module TTP view the alerts of the security issues of client uploaded files in cloud. That is if any of CSP try to access client file the alert will send to TTP. TTP is the only authorized person to access ttp module for security purpose. So others don’t get rights to access this module. CSP (CLOUD SERVICE PROVIDER) Log In : Here CSP has to log in by using their unique user name and password. CSP is the only authorized person to access CSP module for security purpose. So others don’t get rights to access this module.
  • 4. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 35 View :In this module CSP view the client uploaded file in their cloud as encrypted format. If CSP try edit the client file the alert will send to TTP. CSP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. CLIENT Register : Here client has to register their details to log In. It contains unique user name and password. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. Log In : Here client has to log in by using their unique user name and password after registration. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. Upload : In this module client upload their files means give to the correct secret key. The secret key is wrong means the file is not uploaded. And also enter the expire date. That date only visible the file in cloud. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. View : In this module client view their uploaded file from multiple-cloud. Client can edit the particular split. The updates will changed on cloud. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. Download : In this module client download their files means give to the correct secret key. The secret key is wrong means the file is not download. Particular date only client download the upload files.. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. ADVANTAGES  Trusted third party.  Incomplete data in all cloud.  Security alerts, encryption data.  Need low data space.  Cloud provider can't accessing client's data. V. DATAFLOW DIAGRAM LEVEL 0: LEVEL 1:
  • 5. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 36 LEVEL2: LEVEL 3:
  • 6. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 37 VI. ALGORITHM USED LOCAL CONSISTENCY AUDITING Local consistency auditing is an online algorithm (Alg. 1). In Alg. 1, each user will record all of his operations in his UOT. While issuing a read operation, the user will perform local consistency auditing independently. Let R(a) denote a user’s current read whose dictating write is W(a), W(b) denote the last write in the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c). Read-your-write consistency is violated if W(a) happens before W(b), and monotonic-read consistency is violated if W(a) happens before W(c). Note that, from the value of a read, we can know the logical vector and physical vector of its dictating write. Therefore, we can order the dictating writes by their logical vectors.  Initial UOT with ∅  while issue an operation op do  if op = W(a) then  record W(a) in UOT  if op = r(a) then  W(b) ∈ UOT is the last write  if W(a) → W(b) then  Read-your-write consistency is violated  R(c) ∈ UOT is the last read  if W(a) → W(c) then  Monotonic-read consistency is violated  record r(a) in UOT GLOBAL CONSISTENCY AUDITING : Local consistency auditing is an online algorithm (Alg. 1). In Alg. 1, each user will record all of his operations in his UOT. While issuing a read operation, the user will perform local consistency auditing independently. Let R(a) denote a user’s current read whose dictating write is W(a), W(b) denote the last write in the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c). Read-your-write consistency is violated if W(a) happens before W(b), and monotonic-read consistency is violated if W(a) happens before W(c). Note that, from the value of a read, we can know the logical vector and physical vector of its dictating write. Therefore, we can order the dictating writes by their logical vectors.  Each operation in the global trace is denoted by a vertex  for any two operations op1 and op2 do  if op1 → op2 then  A time edge is added from op1 to op2  if op1 = W(a), op2 = R(a), and two operations come  from different users then  A data edge is added from op1 to op2  if op1 = W(a), op2 = W(b), two operations come from  different users, and W(a) is on the route from W(b) to  R(b) then  A causal edge is added from op1 to op2  Check whether the graph is a DAG by topological sorting VII. CONCLUSION The system proposes a consistency as a service (CaaS) model and a two-level auditing structure to help users verify whether the cloud service provider (CSP) is providing the promised consistency, and to quantify the severity of the violations, if any. With the CaaS model, the users can assess the quality of cloud services and choose a right CSP among various candidates, e.g., the least expensive one that still provides adequate consistency for the users’ applications .For our future work, we will conduct a thorough theoretical study of consistency models in cloud computing. REFERENCES [1] Qin Liu, Guojun Wang, , and Jie Wu “Consistency as a Service: Auditing Cloud Consistency “Ieee Transactions On Network And Service Management Vol:11 No:1 Year 2014 [2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, 2010. [3] P. Mell and T. Grance, “The NIST definition of cloud computing (draft),”NIST Special Publication 800-145 (Draft), 2011. [4] E. Brewer, “Towards robust distributed systems,” in Proc. 2000 ACMPODC. [5] “Pushing the CAP: strategies for consistency and availability,”Computer, vol. 45, no. 2, 2012.
  • 7. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 38 [6] M. Ahamad, G. Neiger, J. Burns, P. Kohli, and P. Hutto, “Causal memory: definitions, implementation, and programming,” Distributed Computing, vol. 9, no. 1, 1995. [7] W. Lloyd, M. Freedman, M. Kaminsky, and D. Andersen, “Don’t settlefor eventual: scalable causal consistency for wide-area storage witCOPS,” in Proc. 201 1 ACM SOSP. [8] E. Anderson, X. Li, M. Shah, J. Tucek, and J. Wylie, “What consistencydoes your key-value store actually provide,” in Proc. 2010 USENIXHotDep. [9] C. Fidge, “Timestamps in message-passing systems that preserve thepartial ordering,” in Proc. 1988 ACSC. [10] W. Golab, X. Li, and M. Shah, “Analyzing consistency properties forfun and profit,” in Proc. 2011 ACM PODC.