Professional Documents
Culture Documents
G.B. Satya Rajesh et/(IETRJ) International Engineering and Technology Research Journal, Vol. 1(3), 2013, 112-119.
Abstract:
Keywords:
I. INTRODUCTION
Cloud computing is a means by which highly
scalable, technology-enabled services can be easily
consumed over the Internet on an as-needed basis [1].
The convenience and efficiency of this approach,
however, comes with privacy and security risks [2].A
significant barrier to the adoption of cloud services is
thus user fear of confidential data leakage and loss of
privacy in the cloud. There are a number of notable
commercial there are a number of notable
commercial and individual cloud computing services,
including Amazon, Google, Microsoft, Yahoo, and
Sales force [3]. In short, cloud computing allows for
the sharing and scalable deployment of services, as
needed, from almost any location, and for which the
customer can be billed based on actual usage.
115
IV. SECURITY
We now analyze possible attacks to our
framework We assume that attackers may have
sufficient Java programming skills to disassemble a
JAR file and prior knowledge of our CIA
architecture.
e) Algorithm:
VI. REFERENCES
[1]
HP
cloud
website,
http://h71028.www7.hp.com/enterprise/us/en/technologies/cloud-computing
html?jumpid=ex_r2858_us/en/large/tsg/go_cloud.
[2]. . Pearson, S.: Taking Account of Privacy when
Designing Cloud Computing Services. In: ICSECloud09, Vancouver, IEEE. Also available as HP
Labs
Technical
Report,
HPL-2009-54,
http://www.hpl.hp.com/techreports/2009/HPL-200954.html (2009).
[3].P.T. Jaeger, J. Lin, and J.M. Grimes, Cloud
Computing and Information Policy: Computing in a
Policy Cloud?, J. Information Technology and
Politics, vol. 5, no. 3, pp. 269-283, 2009.
[4].Michael Armbrust et.al, Above the Clouds: A
Berkeley View of Cloud Computing Technical
Report
No.
UCB/EECS-200928http://www.eecs.berkeley.edu/Pubs/TechRpts/2009
/EECS-2009-28.htmlFebruary 10, 2009
[5].S. Pearson and A. Charlesworth, Accountability
as a Way Forward for Privacy Protection in the
Cloud, Proc. First IntlConf. Cloud Computing,
2009.
[6].B. Crispo and G. Ruffo, Reasoning about
Accountability within Delegation, Proc. Third Intl
Conf. Information and Comm. Security (ICICS), pp.
251-260, 2001.
[7].D.J. Weitzner, H. Abelson, T. Berners-Lee, J.
Feigen-baum, J. Hendler, and G.J. Sussman,
Information Accountability, Comm. ACM, vol. 51,
no. 6, pp. 82-87, 2008.
[8].Ackerman, M., Darrell, T., Weitzner, D.: Privacy
in Context. Human Computer Interaction, vol. 16,
no.2, pp. 167-176 (2001) .
[9].Cong Wang, Qian Wang and KuiRen,Ensuring
Data Storage Security in Cloud computing978-14244 -3876-1/2009 IEEE.
[10].SianiPearson Taking account of Privacy when
Designing Cloud computing Services CLOUD09,
May 23, 2009, Vancouver, Canada ,2009IEEE
[11] Meiko Jensen, JorgSchwenk, Nils Gruschka,
Luigi Lo Iacono, On technical security issues in
cloud computing 2009, IEEE Computer Society
[12]. S. Pearson and A. Charles worth,
"Accountability as a Way Forward for Privacy
Protection in the Cloud, "Proc First Int'l conf. Cloud
Computing, 2009.
[13] R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini,
and I. Staicu, A Logic for Auditing Accountability
in Decentralized Systems, Proc. IFIP TC1 WG1.7
Workshop Formal Aspects in Security and Trust, pp.
187-201, 2005.
[14] A. Squicciarini , S. Sundareswaran and D. Lin, "
Preventing Information Leakage from Indexing in the
V. CONCLUSION
An innovative approaches for automatically
logging any access to the data in the cloud together
with an auditing mechanism was proposed. Our
approach allows the data owner to not only audit his
content but also enforce strong back-end protection if
needed. Moreover, one of the main features of our
work is that it enables the data owner to audit even
those copies of its data that were made without his
knowledge.
118
119