Open Access Open Access  Restricted Access Subscription or Fee Access

Data Sharing Accountability in Cloud

S. Arul Murugan, M.A. Bhagyaveni, A.K.P. Kovendan

Abstract


Cloud computing enable extremely scalable services to be easily consumed over the Internet on an as-needed basis. A most important characteristic of the cloud services is that users‟ information are frequently processed somewhat in unknown machines that users do not own or operate. While enjoying the convenience bring by this novel emerging technology, users‟ worries of losing control of their own data (chiefly, economic and physical condition data) can become a important barrier to the wide adoption of cloud services. To take in hand this problem, in this paper, we propose a new highly decentralized information accountability construction to keep track of the actual usage of the users‟ data in the cloud. In particular, we recommend an object-centered approach that enables enclosing our logging mechanism together with users‟ information and policy. We influence the JAR programmable capabilities[14] to in cooperation generate a active and travelling object, and to ensure that any right of entry to users‟ data will trigger confirmation and automated logging local to the JARs. To strengthen user‟s control, we also offer distributed auditing mechanisms. We supply extensive experimental studies that demonstrate the efficiency and effectiveness of the planned approaches.

Keywords


Distributed Cloud Server, JAR, Logger, AES, Encryption, Userlogs, Pull, Push

Full Text:

PDF

References


P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007.

E. Barka and A. Lakas, “Integrating Usage Control with SIP-Based Communications,” J. Computer Systems, Networks, and Comm., vol. 2008, pp. 1-8, 2008.

D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int‟l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.

R. Bose and J. Frew, “Lineage Retrieval for Scientific Data Processing: A Survey,” ACM Computing Surveys, vol. 37, pp. 1- 28, Mar. 2005.

P. Buneman, A. Chapman, and J. Cheney, “Provenance Management in Curated Databases,” Proc. ACM SIGMOD Int‟l Conf. Management of Data (SIGMOD ‟06), pp. 539-550, 2006.

B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int‟l Conf. System Sciences (HICSS), 2004.

OASIS Security Services Technical Committee, “Security Assertion Markup Language (saml) 2.0,” http://www.oasis-open.org/ committees/tc home.php?wg abbrev=security, 2012.

R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, “A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.

B. Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int‟l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.

P.T. Jaeger, J. Lin, and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?,” J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.

R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, “Towards a Theory of Accountability and Audit,” Proc. 14th European Conf. Research in Computer Security (ESORICS), pp. 152-167, 2009

S. Pearson and A. Charlesworth, “Accountability as a Way Forward for Privacy Protection in the Cloud,” Proc. First Int‟l Conf. Cloud Computing, 2009.

Ensuring Distributed Accountability For Data Sharing In The Cloud Smitha Sundareswaran, Anna C. Squicciarini, Member, Ieee, And Dan Lin , Ieee Transactions On Dependable And Secure Computing, Vol. 9, No. 4, July/August 2012

P.T. Jaeger, J. Lin, and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?,” J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.

R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, “Towards a Theory of Accountability and Audit,” Proc. 14th European Conf. Research in Computer Security (ESORICS), pp. 152-167, 2009.

Flickr, http://www.flickr.com/, 2012.

Smitha sundareswaran and Anna C.squiccaiarni, “Ensuring distributed data sharing accountability in cloud,” proc. IEEE vol 9, no 4 July/August 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.