SlideShare a Scribd company logo
1 of 7
Download to read offline
The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 12 || December - 2014 || Pages || 33-38||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 32
Two Level Auditing Architecture to Maintain Consistent In
Cloud
Deepak Batta1
, P.Srinivasan2
1
ME-CSE (Final year), Muthayammal Engineering College, Rasipuram
2
Assistant professor, Muthayammal Engineering College, Rasipuram
------------------------------------------------------ABSTRACT---------------------------------------------------
Confidential data in an enterprise may be illegally accessed through a remote interface provided by a multiple-
cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain
storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers (CSPs) to provide
security techniques for managing their storage services. To overcome these problems we present a Consistency
as a service auditing cloud scheme. We prove the security of our scheme based data fragmentation on multiple
clouds. So the proposed system has data fragmentation, data security and storage on multiple cloud services.
We used trusted third party to store the data on multiple cloud and find the data access by untrusted cloud
service providers. In this system the client data divide into multiple pieces and send to the multiple clouds with
help of trusted third party. If any of the untrusted cloud service providers try modify the data the alert will send
to trusted third party about illegal access of untrusted cloud service provider.
--------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 12 December 2014 Date of Accepted: 05 January 2015
-------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cloud computing has become commercially popular ,as it promises to guarantee scalability, elasticity,
and high availability at a low cost , the trend of the everything-as-a-service (XaaS) model, data storages
,virtualized infrastructure, virtualized platforms, as well as software and applications are being provided and
consumed as services in the cloud. Cloud storage services can be regarded as a typical service in cloud
computing, which involves the delivery of data storage as a service, including data base like services and
network attached storage, often billed on a utility computing basis, e.g., per gigabyte per month. Examples
include Amazon SimpleDB1, Microsoft Azure storage2, and so on. The usage of the cloud storage services, the
customers can access data stored in a cloud anytime and anywhere using any device, without caring about a
large amount of capital investment when deploying the underlying hardware infrastructures. To meet the
promise of ubiquitous 24/7 access, the cloud service provider (CSP) stores data replicas on multiple
geographically distributed servers. A key problem of using the replication technique in clouds is that it is very
expensive to achieve strong consistency on a worldwide scale, where a user is ensured to see the latest updates.
Actually, mandated by the CAP principle3, many CSPs (e.g., Amazon S3) only ensure weak consistency, such
as eventual consistency, for performance and high availability, where a user can read stale data for a period of
time. The domain name system (DNS) is one of the most popular applications that implement eventual
consistency. Updates to name will not be visible immediately, but all clients are ensured to see them eventually.
Fig. 1.1: An application requires casual consistency
However, eventual consistency is not a catholicon for all applications. Especially for the interactive
applications, stronger consistency assurance is of increasing importance. Consider the following scenario as
shown in Fig. 1. Suppose that Alice and Bob are cooperating on a project using a cloud storage service, where
all of the related data is replicated to five cloud servers, CS1, . . ., CS5. After uploading a new version of there
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 33
requirement analysis to a CS4, Alice calls Bob to download the latest version for integrated design. Here, after
Alice calls Bob, the causal relationship [5] is established between Alice’s update and Bob’s read. Therefore, the
cloud should provide causal consistency, which ensures that Alice’s update is committed to all of the replicas
before Bob’s read. In this case, the integrated design that is based on an old version may not satisfy the real
requirements of customers. Actually, different applications have different consistency requirements.
II. RELATED WORK
In “A VIEW OF CLOUD COMPUTING” paper the author proposed the Private-key storage e
outsourcing allows clients with either limited resources or limited expertise to store and distribute large amounts
of symmetrically encrypted data at low cost. Since regular private-key encryption prevents one from searching
over encrypted data, clients also lose the ability to selectively retrieve segments of their data. To address this,
several techniques have been proposed for provisioning symmetric encryption with search capabilities the
resulting construct is typically called searchable encryption. The area of searchable encryption has been
identified by DARPA as one of the technical advances that can be used to balance the need for both privacy and
national security in information aggregation systems. One approach to provisioning symmetric encryption with
search capabilities is with a so-called secure index. An index is a data structure that stores document collections
while supporting efficient keyword search, i.e., given a keyword, the index returns a pointer to the documents
that contain it. Informally, an index is secure" if the search operation for a keyword w can only be performed by
users that possess a trapdoor" for w and if the trapdoor can only be generated with a secret key. Without
knowledge of trapdoors, the index leaks no information about its contents. one can build a symmetric searchable
encryption scheme from a secure index as follows: the client indexes and encrypts its document collection and
sends the secure index together with the encrypted data to the server. To search for a keyword w, the client
generates and sends a trapdoor for w which the server uses to run the search operation and recover pointers to
the appropriate (encrypted) documents.
Symmetric searchable encryption can be achieved in its full generality and with optimal security
using the work of oblivious RAMs. More precisely, using these techniques any type of search query can be
achieved (e.g., conjunctions or disjunctions of keywords) without leaking any information to the server, not
even the access pattern" (i.e., which documents contain the keyword). This strong privacy guarantee, however,
comes at the cost of a logarithmic (in the number of documents) number of rounds of interaction for each read
and write. In the same paper, the authors show a 2-round solution, but with considerably larger square-root
overhead. Therefore, the previously mentioned work on searchable encryption tries to achieve more efficient
solutions (typically in one or two rounds) by weakening the privacy guarantees.
The System introduces new adversarial models for SSE. The first, which we refer to as non-adaptive,
only considers adversaries that make their search queries without taking into account the trapdoors and search
outcomes of previous searches. The second |adaptive| considers adversaries that choose their queries as a
function of previously obtained trapdoors and search outcomes. All previous work on SSE (with the exception
of oblivious RAMs) falls within the non-adaptive setting. The implication is that, contrary to the natural use of
searchable encryption described in these definitions only guarantee security for users that perform all their
searches at once. System addresses this by introducing game-based and simulation-based definitions in the
adaptive setting.In analyzing consistency properties forfun and profit paper the author proposed the system
consider the following distributed file system: a user U pays a server S for storage service, with the goal being
that U can retrieve the stored ¯les anytime and anywhere through Internet connections. For example, U may
store files containing personal data that U may want to later access using his wireless PDA. A user might be
willing to pay for such a service in order to have access to data without carrying devices with large amount of
memory, and to have the data well-maintained by professionals. Such distributed file services already exist, such
as the Yahoo! Briefcase".1 The system expect such services will grow with the expansion of mobile and
pervasive computing. In many cases U will not want to reveal the contents of his files to S in order to maintain
security or privacy. It follows that the files will often be stored in encrypted form. Suppose, however, that later
U wants to retrieve files based on a keyword search. That is, U wants to retrieve ¯les containing (or indexed by)
some keyword. If the files are encrypted, there is no straightforward way for S to do keyword search unless U is
willing to leak the decryption key. A trivial solution that preserves the security of U's files is to have S send all
the encrypted files back to him. This may not be a feasible solution if U is using mobile devices with limited
bandwidth and storage space. An additional complication is that U may naturally also want to keep secret the
keyword that he is interested in as well.
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 34
Data-centric consistency : Data-centric consistency model considers the internal state of a storage system,
i.e., how updates flow through the system and what guarantees the system can provide with respect to updates.
However, to a customer, it really does not matter whether or not a storage system internally contains any stale
copies. As long as no stale data is observed from the client’s point of view, the customer is satisfied.
Client-centric consistency : Client-centric consistency model concentrates on what specific customers want,
i.e., how the customers observe data updates. Their work also describes different levels of consistency in
distributed systems, from strict consistency to weak consistency. High consistency implies high cost and
reduced availability. the states that strict consistency is never needed in practice, and is even considered harmful
III. EXISTING METHODOLOGY
There exist various tools and technologies for multiple cloud, such as Platform VM Orchestrator,
Vmware vSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform
(DCSP) for managing clients’ data. However, if such an important platform is vulnerable to security attacks, it
would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be
illegally accessed through a remote interface provided by a multiple-cloud, or relevant data and archives may be
lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is
indispensable for cloud service providers (CSPs) to provide security techniques for managing their storage
services.
DISADVANTAGES
 Untrusted clouds.
 Full data in all cloud.
 Low level security.
 Need more data space.
 Cloud provider can access client's data.
IV. PROPOSED SYSTEM
We present a Consistency as a service auditing cloud scheme. We prove the security of our scheme
based data fragmentation on multiple clouds. So the proposed system has data fragmentation, data security and
storage on multiple cloud services. We used trusted third party to store the data on multiple cloud and find the
data access by untrusted cloud service providers. In this system the client data divide into multiple pieces and
common secret key, send to the multiple clouds with help of trusted third party. If any of the untrusted cloud
service providers try modify the data the alert will send to trusted third party about illegal access of untrusted
cloud service provider.
TTP (TRUSTED THIRD PARTY)
Log In : Here TTP has to log in by using their unique user name and password. TTP is the only authorized
person to access TTP module for security purpose. So others don’t get rights to access this module.
Transfer : In this module TTP view the client uploaded file and transfer them into multiple-cloud. The file will
split into 3 pieces and stored in cloud. TTP is the only authorized person to access TTP module for security
purpose. So others don’t get rights to access this module.
View : In this module TTP view the client uploaded file from multiple-cloud. TTP is the only authorized person
to access TTP module for security purpose. So others don’t get rights to access this module.
Alerts : In this module TTP view the alerts of the security issues of client uploaded files in cloud. That is if any
of CSP try to access client file the alert will send to TTP. TTP is the only authorized person to access ttp
module for security purpose. So others don’t get rights to access this module.
CSP (CLOUD SERVICE PROVIDER)
Log In : Here CSP has to log in by using their unique user name and password. CSP is the only authorized
person to access CSP module for security purpose. So others don’t get rights to access this module.
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 35
View :In this module CSP view the client uploaded file in their cloud as encrypted format. If CSP try edit the
client file the alert will send to TTP. CSP is the only authorized person to access TTP module for security
purpose. So others don’t get rights to access this module.
CLIENT
Register : Here client has to register their details to log In. It contains unique user name and password. Client is
the only authorized person to access this module for security purpose. So others don’t get rights to access this
module.
Log In : Here client has to log in by using their unique user name and password after registration. Client is the
only authorized person to access this module for security purpose. So others don’t get rights to access this
module.
Upload : In this module client upload their files means give to the correct secret key. The secret key is wrong
means the file is not uploaded. And also enter the expire date. That date only visible the file in cloud. Client is
the only authorized person to access this module for security purpose. So others don’t get rights to access this
module.
View : In this module client view their uploaded file from multiple-cloud. Client can edit the particular split.
The updates will changed on cloud. Client is the only authorized person to access this module for security
purpose. So others don’t get rights to access this module.
Download : In this module client download their files means give to the correct secret key. The secret key is
wrong means the file is not download. Particular date only client download the upload files.. Client is the only
authorized person to access this module for security purpose. So others don’t get rights to access this module.
ADVANTAGES
 Trusted third party.
 Incomplete data in all cloud.
 Security alerts, encryption data.
 Need low data space.
 Cloud provider can't accessing client's data.
V. DATAFLOW DIAGRAM
LEVEL 0:
LEVEL 1:
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 36
LEVEL2:
LEVEL 3:
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 37
VI. ALGORITHM USED
LOCAL CONSISTENCY AUDITING
Local consistency auditing is an online algorithm (Alg. 1). In Alg. 1, each user will record all of his
operations in his UOT. While issuing a read operation, the user will perform local consistency auditing
independently. Let R(a) denote a user’s current read whose dictating write is W(a), W(b) denote the last write in
the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c). Read-your-write consistency
is violated if W(a) happens before W(b), and monotonic-read consistency is violated if W(a) happens before
W(c). Note that, from the value of a read, we can know the logical vector and physical vector of its dictating
write. Therefore, we can order the dictating writes by their logical vectors.
 Initial UOT with ∅
 while issue an operation op do
 if op = W(a) then
 record W(a) in UOT
 if op = r(a) then
 W(b) ∈ UOT is the last write
 if W(a) → W(b) then
 Read-your-write consistency is violated
 R(c) ∈ UOT is the last read
 if W(a) → W(c) then
 Monotonic-read consistency is violated
 record r(a) in UOT
GLOBAL CONSISTENCY AUDITING : Local consistency auditing is an online algorithm (Alg. 1). In Alg.
1, each user will record all of his operations in his UOT. While issuing a read operation, the user will perform
local consistency auditing independently. Let R(a) denote a user’s current read whose dictating write is W(a),
W(b) denote the last write in the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c).
Read-your-write consistency is violated if W(a) happens before W(b), and monotonic-read consistency is
violated if W(a) happens before W(c). Note that, from the value of a read, we can know the logical vector and
physical vector of its dictating write. Therefore, we can order the dictating writes by their logical vectors.
 Each operation in the global trace is denoted by a vertex
 for any two operations op1 and op2 do
 if op1 → op2 then
 A time edge is added from op1 to op2
 if op1 = W(a), op2 = R(a), and two operations come
 from different users then
 A data edge is added from op1 to op2
 if op1 = W(a), op2 = W(b), two operations come from
 different users, and W(a) is on the route from W(b) to
 R(b) then
 A causal edge is added from op1 to op2
 Check whether the graph is a DAG by topological sorting
VII. CONCLUSION
The system proposes a consistency as a service (CaaS) model and a two-level auditing structure to help
users verify whether the cloud service provider (CSP) is providing the promised consistency, and to quantify the
severity of the violations, if any. With the CaaS model, the users can assess the quality of cloud services and
choose a right CSP among various candidates, e.g., the least expensive one that still provides adequate
consistency for the users’ applications .For our future work, we will conduct a thorough theoretical study of
consistency models in cloud computing.
REFERENCES
[1] Qin Liu, Guojun Wang, , and Jie Wu “Consistency as a Service: Auditing Cloud Consistency “Ieee Transactions On Network
And Service Management Vol:11 No:1 Year 2014
[2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “A view of
cloud computing,” Commun. ACM, vol. 53, no. 4, 2010.
[3] P. Mell and T. Grance, “The NIST definition of cloud computing (draft),”NIST Special Publication 800-145 (Draft), 2011.
[4] E. Brewer, “Towards robust distributed systems,” in Proc. 2000 ACMPODC.
[5] “Pushing the CAP: strategies for consistency and availability,”Computer, vol. 45, no. 2, 2012.
Two Level Auditing Architecture To Maintain…
www.theijes.com The IJES Page 38
[6] M. Ahamad, G. Neiger, J. Burns, P. Kohli, and P. Hutto, “Causal memory: definitions, implementation, and programming,”
Distributed Computing, vol. 9, no. 1, 1995.
[7] W. Lloyd, M. Freedman, M. Kaminsky, and D. Andersen, “Don’t settlefor eventual: scalable causal consistency for wide-area
storage witCOPS,” in Proc. 201 1 ACM SOSP.
[8] E. Anderson, X. Li, M. Shah, J. Tucek, and J. Wylie, “What consistencydoes your key-value store actually provide,” in Proc.
2010 USENIXHotDep.
[9] C. Fidge, “Timestamps in message-passing systems that preserve thepartial ordering,” in Proc. 1988 ACSC.
[10] W. Golab, X. Li, and M. Shah, “Analyzing consistency properties forfun and profit,” in Proc. 2011 ACM PODC.

More Related Content

What's hot

IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
E041212224
E041212224E041212224
E041212224IOSR-JEN
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...LeMeniz Infotech
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computingVenkat Projects
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...ijiert bestjournal
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordIMPULSE_TECHNOLOGY
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageIRJET Journal
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...rahulmonikasharma
 

What's hot (20)

IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
552 556
552 556552 556
552 556
 
E041212224
E041212224E041212224
E041212224
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
 
Final 1st
Final 1stFinal 1st
Final 1st
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 

Viewers also liked

Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...theijes
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphonetheijes
 
Coordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin KebbiCoordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin Kebbitheijes
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting Systemtheijes
 
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...theijes
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...theijes
 
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA AlgorithmAdaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithmtheijes
 
The First Idea of N-Aelads Technology
The First Idea of N-Aelads TechnologyThe First Idea of N-Aelads Technology
The First Idea of N-Aelads Technologytheijes
 
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...theijes
 
Implementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption StandardImplementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption Standardtheijes
 
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...theijes
 
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...theijes
 
Robotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly peopleRobotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly peopletheijes
 
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...theijes
 
Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...theijes
 
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide InsertsMachining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Insertstheijes
 
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...theijes
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technologytheijes
 
Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...theijes
 

Viewers also liked (19)

Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
Consumer Knowledge Of Food Labels Of Low Income Female Workers In Michael Okp...
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphone
 
Coordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin KebbiCoordinate Transformation Of Birnin Kebbi
Coordinate Transformation Of Birnin Kebbi
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
 
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
The Effects of Welding Processes and Microstructure on 3 Body Abrasive Wear R...
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...
 
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA AlgorithmAdaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
Adaptive Optimization of Cloud Security Resource Dispatching SFLA Algorithm
 
The First Idea of N-Aelads Technology
The First Idea of N-Aelads TechnologyThe First Idea of N-Aelads Technology
The First Idea of N-Aelads Technology
 
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
Statistical Analysis of Factors Affecting the Dry Sliding Wear Behaviour of A...
 
Implementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption StandardImplementation of Stronger S-Box for Advanced Encryption Standard
Implementation of Stronger S-Box for Advanced Encryption Standard
 
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
Feasible Interfacing and Programming of Industrial Control Technology Unit wi...
 
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
Comparison of Ordinary Least Square Regression and Geographically Weighted Re...
 
Robotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly peopleRobotic assistance for the visually impaired and elderly people
Robotic assistance for the visually impaired and elderly people
 
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
Parametric Optimization of Wire Electrical Discharge Machining (WEDM) Process...
 
Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...Assessing the impact of community development efforts in the nigeria`s state ...
Assessing the impact of community development efforts in the nigeria`s state ...
 
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide InsertsMachining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
Machining Of an Aluminum Metal Matrix Composite Using Tungsten Carbide Inserts
 
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
Quality Evaluation Of Complementary Food Formulated From Moringa Oleifera Lea...
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
 
Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...Design and Construction of a Simple and Reliable Temperature Control Viscomet...
Design and Construction of a Simple and Reliable Temperature Control Viscomet...
 

Similar to Two Level Auditing Architecture to Maintain Consistent In Cloud

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 

Similar to Two Level Auditing Architecture to Maintain Consistent In Cloud (20)

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
El35782786
El35782786El35782786
El35782786
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Two Level Auditing Architecture to Maintain Consistent In Cloud

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 12 || December - 2014 || Pages || 33-38|| ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 32 Two Level Auditing Architecture to Maintain Consistent In Cloud Deepak Batta1 , P.Srinivasan2 1 ME-CSE (Final year), Muthayammal Engineering College, Rasipuram 2 Assistant professor, Muthayammal Engineering College, Rasipuram ------------------------------------------------------ABSTRACT--------------------------------------------------- Confidential data in an enterprise may be illegally accessed through a remote interface provided by a multiple- cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers (CSPs) to provide security techniques for managing their storage services. To overcome these problems we present a Consistency as a service auditing cloud scheme. We prove the security of our scheme based data fragmentation on multiple clouds. So the proposed system has data fragmentation, data security and storage on multiple cloud services. We used trusted third party to store the data on multiple cloud and find the data access by untrusted cloud service providers. In this system the client data divide into multiple pieces and send to the multiple clouds with help of trusted third party. If any of the untrusted cloud service providers try modify the data the alert will send to trusted third party about illegal access of untrusted cloud service provider. -------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 12 December 2014 Date of Accepted: 05 January 2015 ------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Cloud computing has become commercially popular ,as it promises to guarantee scalability, elasticity, and high availability at a low cost , the trend of the everything-as-a-service (XaaS) model, data storages ,virtualized infrastructure, virtualized platforms, as well as software and applications are being provided and consumed as services in the cloud. Cloud storage services can be regarded as a typical service in cloud computing, which involves the delivery of data storage as a service, including data base like services and network attached storage, often billed on a utility computing basis, e.g., per gigabyte per month. Examples include Amazon SimpleDB1, Microsoft Azure storage2, and so on. The usage of the cloud storage services, the customers can access data stored in a cloud anytime and anywhere using any device, without caring about a large amount of capital investment when deploying the underlying hardware infrastructures. To meet the promise of ubiquitous 24/7 access, the cloud service provider (CSP) stores data replicas on multiple geographically distributed servers. A key problem of using the replication technique in clouds is that it is very expensive to achieve strong consistency on a worldwide scale, where a user is ensured to see the latest updates. Actually, mandated by the CAP principle3, many CSPs (e.g., Amazon S3) only ensure weak consistency, such as eventual consistency, for performance and high availability, where a user can read stale data for a period of time. The domain name system (DNS) is one of the most popular applications that implement eventual consistency. Updates to name will not be visible immediately, but all clients are ensured to see them eventually. Fig. 1.1: An application requires casual consistency However, eventual consistency is not a catholicon for all applications. Especially for the interactive applications, stronger consistency assurance is of increasing importance. Consider the following scenario as shown in Fig. 1. Suppose that Alice and Bob are cooperating on a project using a cloud storage service, where all of the related data is replicated to five cloud servers, CS1, . . ., CS5. After uploading a new version of there
  • 2. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 33 requirement analysis to a CS4, Alice calls Bob to download the latest version for integrated design. Here, after Alice calls Bob, the causal relationship [5] is established between Alice’s update and Bob’s read. Therefore, the cloud should provide causal consistency, which ensures that Alice’s update is committed to all of the replicas before Bob’s read. In this case, the integrated design that is based on an old version may not satisfy the real requirements of customers. Actually, different applications have different consistency requirements. II. RELATED WORK In “A VIEW OF CLOUD COMPUTING” paper the author proposed the Private-key storage e outsourcing allows clients with either limited resources or limited expertise to store and distribute large amounts of symmetrically encrypted data at low cost. Since regular private-key encryption prevents one from searching over encrypted data, clients also lose the ability to selectively retrieve segments of their data. To address this, several techniques have been proposed for provisioning symmetric encryption with search capabilities the resulting construct is typically called searchable encryption. The area of searchable encryption has been identified by DARPA as one of the technical advances that can be used to balance the need for both privacy and national security in information aggregation systems. One approach to provisioning symmetric encryption with search capabilities is with a so-called secure index. An index is a data structure that stores document collections while supporting efficient keyword search, i.e., given a keyword, the index returns a pointer to the documents that contain it. Informally, an index is secure" if the search operation for a keyword w can only be performed by users that possess a trapdoor" for w and if the trapdoor can only be generated with a secret key. Without knowledge of trapdoors, the index leaks no information about its contents. one can build a symmetric searchable encryption scheme from a secure index as follows: the client indexes and encrypts its document collection and sends the secure index together with the encrypted data to the server. To search for a keyword w, the client generates and sends a trapdoor for w which the server uses to run the search operation and recover pointers to the appropriate (encrypted) documents. Symmetric searchable encryption can be achieved in its full generality and with optimal security using the work of oblivious RAMs. More precisely, using these techniques any type of search query can be achieved (e.g., conjunctions or disjunctions of keywords) without leaking any information to the server, not even the access pattern" (i.e., which documents contain the keyword). This strong privacy guarantee, however, comes at the cost of a logarithmic (in the number of documents) number of rounds of interaction for each read and write. In the same paper, the authors show a 2-round solution, but with considerably larger square-root overhead. Therefore, the previously mentioned work on searchable encryption tries to achieve more efficient solutions (typically in one or two rounds) by weakening the privacy guarantees. The System introduces new adversarial models for SSE. The first, which we refer to as non-adaptive, only considers adversaries that make their search queries without taking into account the trapdoors and search outcomes of previous searches. The second |adaptive| considers adversaries that choose their queries as a function of previously obtained trapdoors and search outcomes. All previous work on SSE (with the exception of oblivious RAMs) falls within the non-adaptive setting. The implication is that, contrary to the natural use of searchable encryption described in these definitions only guarantee security for users that perform all their searches at once. System addresses this by introducing game-based and simulation-based definitions in the adaptive setting.In analyzing consistency properties forfun and profit paper the author proposed the system consider the following distributed file system: a user U pays a server S for storage service, with the goal being that U can retrieve the stored ¯les anytime and anywhere through Internet connections. For example, U may store files containing personal data that U may want to later access using his wireless PDA. A user might be willing to pay for such a service in order to have access to data without carrying devices with large amount of memory, and to have the data well-maintained by professionals. Such distributed file services already exist, such as the Yahoo! Briefcase".1 The system expect such services will grow with the expansion of mobile and pervasive computing. In many cases U will not want to reveal the contents of his files to S in order to maintain security or privacy. It follows that the files will often be stored in encrypted form. Suppose, however, that later U wants to retrieve files based on a keyword search. That is, U wants to retrieve ¯les containing (or indexed by) some keyword. If the files are encrypted, there is no straightforward way for S to do keyword search unless U is willing to leak the decryption key. A trivial solution that preserves the security of U's files is to have S send all the encrypted files back to him. This may not be a feasible solution if U is using mobile devices with limited bandwidth and storage space. An additional complication is that U may naturally also want to keep secret the keyword that he is interested in as well.
  • 3. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 34 Data-centric consistency : Data-centric consistency model considers the internal state of a storage system, i.e., how updates flow through the system and what guarantees the system can provide with respect to updates. However, to a customer, it really does not matter whether or not a storage system internally contains any stale copies. As long as no stale data is observed from the client’s point of view, the customer is satisfied. Client-centric consistency : Client-centric consistency model concentrates on what specific customers want, i.e., how the customers observe data updates. Their work also describes different levels of consistency in distributed systems, from strict consistency to weak consistency. High consistency implies high cost and reduced availability. the states that strict consistency is never needed in practice, and is even considered harmful III. EXISTING METHODOLOGY There exist various tools and technologies for multiple cloud, such as Platform VM Orchestrator, Vmware vSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform (DCSP) for managing clients’ data. However, if such an important platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed through a remote interface provided by a multiple-cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers (CSPs) to provide security techniques for managing their storage services. DISADVANTAGES  Untrusted clouds.  Full data in all cloud.  Low level security.  Need more data space.  Cloud provider can access client's data. IV. PROPOSED SYSTEM We present a Consistency as a service auditing cloud scheme. We prove the security of our scheme based data fragmentation on multiple clouds. So the proposed system has data fragmentation, data security and storage on multiple cloud services. We used trusted third party to store the data on multiple cloud and find the data access by untrusted cloud service providers. In this system the client data divide into multiple pieces and common secret key, send to the multiple clouds with help of trusted third party. If any of the untrusted cloud service providers try modify the data the alert will send to trusted third party about illegal access of untrusted cloud service provider. TTP (TRUSTED THIRD PARTY) Log In : Here TTP has to log in by using their unique user name and password. TTP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. Transfer : In this module TTP view the client uploaded file and transfer them into multiple-cloud. The file will split into 3 pieces and stored in cloud. TTP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. View : In this module TTP view the client uploaded file from multiple-cloud. TTP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. Alerts : In this module TTP view the alerts of the security issues of client uploaded files in cloud. That is if any of CSP try to access client file the alert will send to TTP. TTP is the only authorized person to access ttp module for security purpose. So others don’t get rights to access this module. CSP (CLOUD SERVICE PROVIDER) Log In : Here CSP has to log in by using their unique user name and password. CSP is the only authorized person to access CSP module for security purpose. So others don’t get rights to access this module.
  • 4. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 35 View :In this module CSP view the client uploaded file in their cloud as encrypted format. If CSP try edit the client file the alert will send to TTP. CSP is the only authorized person to access TTP module for security purpose. So others don’t get rights to access this module. CLIENT Register : Here client has to register their details to log In. It contains unique user name and password. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. Log In : Here client has to log in by using their unique user name and password after registration. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. Upload : In this module client upload their files means give to the correct secret key. The secret key is wrong means the file is not uploaded. And also enter the expire date. That date only visible the file in cloud. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. View : In this module client view their uploaded file from multiple-cloud. Client can edit the particular split. The updates will changed on cloud. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. Download : In this module client download their files means give to the correct secret key. The secret key is wrong means the file is not download. Particular date only client download the upload files.. Client is the only authorized person to access this module for security purpose. So others don’t get rights to access this module. ADVANTAGES  Trusted third party.  Incomplete data in all cloud.  Security alerts, encryption data.  Need low data space.  Cloud provider can't accessing client's data. V. DATAFLOW DIAGRAM LEVEL 0: LEVEL 1:
  • 5. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 36 LEVEL2: LEVEL 3:
  • 6. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 37 VI. ALGORITHM USED LOCAL CONSISTENCY AUDITING Local consistency auditing is an online algorithm (Alg. 1). In Alg. 1, each user will record all of his operations in his UOT. While issuing a read operation, the user will perform local consistency auditing independently. Let R(a) denote a user’s current read whose dictating write is W(a), W(b) denote the last write in the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c). Read-your-write consistency is violated if W(a) happens before W(b), and monotonic-read consistency is violated if W(a) happens before W(c). Note that, from the value of a read, we can know the logical vector and physical vector of its dictating write. Therefore, we can order the dictating writes by their logical vectors.  Initial UOT with ∅  while issue an operation op do  if op = W(a) then  record W(a) in UOT  if op = r(a) then  W(b) ∈ UOT is the last write  if W(a) → W(b) then  Read-your-write consistency is violated  R(c) ∈ UOT is the last read  if W(a) → W(c) then  Monotonic-read consistency is violated  record r(a) in UOT GLOBAL CONSISTENCY AUDITING : Local consistency auditing is an online algorithm (Alg. 1). In Alg. 1, each user will record all of his operations in his UOT. While issuing a read operation, the user will perform local consistency auditing independently. Let R(a) denote a user’s current read whose dictating write is W(a), W(b) denote the last write in the UOT, and R(c) denote the last read in the UOT whose dictating write is W(c). Read-your-write consistency is violated if W(a) happens before W(b), and monotonic-read consistency is violated if W(a) happens before W(c). Note that, from the value of a read, we can know the logical vector and physical vector of its dictating write. Therefore, we can order the dictating writes by their logical vectors.  Each operation in the global trace is denoted by a vertex  for any two operations op1 and op2 do  if op1 → op2 then  A time edge is added from op1 to op2  if op1 = W(a), op2 = R(a), and two operations come  from different users then  A data edge is added from op1 to op2  if op1 = W(a), op2 = W(b), two operations come from  different users, and W(a) is on the route from W(b) to  R(b) then  A causal edge is added from op1 to op2  Check whether the graph is a DAG by topological sorting VII. CONCLUSION The system proposes a consistency as a service (CaaS) model and a two-level auditing structure to help users verify whether the cloud service provider (CSP) is providing the promised consistency, and to quantify the severity of the violations, if any. With the CaaS model, the users can assess the quality of cloud services and choose a right CSP among various candidates, e.g., the least expensive one that still provides adequate consistency for the users’ applications .For our future work, we will conduct a thorough theoretical study of consistency models in cloud computing. REFERENCES [1] Qin Liu, Guojun Wang, , and Jie Wu “Consistency as a Service: Auditing Cloud Consistency “Ieee Transactions On Network And Service Management Vol:11 No:1 Year 2014 [2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, 2010. [3] P. Mell and T. Grance, “The NIST definition of cloud computing (draft),”NIST Special Publication 800-145 (Draft), 2011. [4] E. Brewer, “Towards robust distributed systems,” in Proc. 2000 ACMPODC. [5] “Pushing the CAP: strategies for consistency and availability,”Computer, vol. 45, no. 2, 2012.
  • 7. Two Level Auditing Architecture To Maintain… www.theijes.com The IJES Page 38 [6] M. Ahamad, G. Neiger, J. Burns, P. Kohli, and P. Hutto, “Causal memory: definitions, implementation, and programming,” Distributed Computing, vol. 9, no. 1, 1995. [7] W. Lloyd, M. Freedman, M. Kaminsky, and D. Andersen, “Don’t settlefor eventual: scalable causal consistency for wide-area storage witCOPS,” in Proc. 201 1 ACM SOSP. [8] E. Anderson, X. Li, M. Shah, J. Tucek, and J. Wylie, “What consistencydoes your key-value store actually provide,” in Proc. 2010 USENIXHotDep. [9] C. Fidge, “Timestamps in message-passing systems that preserve thepartial ordering,” in Proc. 1988 ACSC. [10] W. Golab, X. Li, and M. Shah, “Analyzing consistency properties forfun and profit,” in Proc. 2011 ACM PODC.