Safeguarding the liabilities of Data Accessing in Cloud Computing

1
Kethan Harish Yekula
Kethan Harish Yekula
2
Dr. Y.Venkateswarlu
Dr. Y.Venkateswarlu
3
Suneel Kumar Badugu
Suneel Kumar Badugu
1 Jawaharlala Nehru Technological University Kakinada(JNTUK)

Send Message

To: Author

GJCST Volume 13 Issue B4

Article Fingerprint

ReserarchID

CSTB538FH

Safeguarding the liabilities of Data Accessing in Cloud Computing Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Cloud computing is the process of providing the virtualized services over the internet. The space in the web commonly known as Cloud has been monitored by service provider. In a real time scenario, a user registers for a particular service and shares his data as well as access credential policies with CSP (cloud service provider). Though cloud computing has got major flexibility in data accessing, users are very much concerned about their data security as it may be mislead by service providers. They may share the owner’s data to unauthenticated persons. This is a big threat to the data owners. In this paper a modern approach, is proposed namely Cloud Information Accountability (CIA) framework, and based on the notion of data liability. We identify the common requirements and develop several guidelines to achieve data accountability in the cloud. Once the data owner provides data, the service provider will have full access and permission rights, on the data. Using traditional access control mechanisms, after data rights are permitted, the data is in the hands of the service provider. We propose an algorithm, which gives the details of people accessing the data using the automated logging details through the JAR files.

18 Cites in Articles

References

  1. Smitha Sundareswaran,Anna Squicciarini,Dan Lin (2012). Ensuring Distributed Accountability for Data Sharing in the Cloud.
  2. Y Chen (2003). Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
  3. B Chun,A Bavier (2004). Decentralized Trust Management and Accountability in Federated Systems.
  4. G Ateniese,R Burns,R Curtmola,J Herring,L Kissner,Z Peterson,D Song (2007). Provable Data Possession at Untrusted Stores.
  5. K Wierenga,E Lear,S Josefsson (2012). A Simple Authentication and Security Layer (SASL) and GSS-API Mechanism for the Security Assertion Markup Language (SAML).
  6. R Corin,S Etalle,J Den Hartog,G Lenzini,I Staicu (2005). A Logic for Auditing Accountability in Decentralized Systems.
  7. Bruno Crispo,Giancarlo Ruffo (2001). Reasoning about Accountability within Delegation.
  8. J Hightower,G Borriello (2001). Location systems for ubiquitous computing.
  9. E Barka,A Lakas (2008). Integrating Usage Control with SIP‐Based Communications.
  10. R Jagadeesan,A Jeffrey,C Pitcher,J Riely (2009). Towards a Theory of Accountability and Audit.
  11. S Pearson,A Charlesworth (2009). Accountability as a WayForward for Privacy Protection in the Cloud.
  12. J Lin,R Geiger,R Smith,A Chan,S Wanchoo (2004). Method for Authenticating a Java Archive (jar) for Portable Devices.
  13. The Network Time Protocol.
  14. S Pearson,Y Shen,M Mowbray (2009). A Privacy Manager forCloud Computing.
  15. J Holford,W Caelli,A Rhodes (2004). Using Self-Defending Objects to Develop Security Aware Applications in Java.
  16. R Kailar (1996). Accountability in electronic commerce protocols.
  17. D Boneh,M Franklin (2001). Identity-Based Encryption from theWeil Pairing.
  18. T Mather,S Kumaraswamy,S Latif,M Mont,S Pearson,P Bramhall (2003). Towards AccountableManagement of Identity and Privacy: Sticky Policies and Enforceable 21. Tracing Services.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Kethan Harish Yekula. 2013. \u201cSafeguarding the liabilities of Data Accessing in Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 13 (GJCST Volume 13 Issue B4): .

Download Citation

Issue Cover
GJCST Volume 13 Issue B4
Pg. 23- 28
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

November 11, 2013

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9375
Total Downloads: 2306
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Cloud computing is the process of providing the virtualized services over the internet. The space in the web commonly known as Cloud has been monitored by service provider. In a real time scenario, a user registers for a particular service and shares his data as well as access credential policies with CSP (cloud service provider). Though cloud computing has got major flexibility in data accessing, users are very much concerned about their data security as it may be mislead by service providers. They may share the owner’s data to unauthenticated persons. This is a big threat to the data owners. In this paper a modern approach, is proposed namely Cloud Information Accountability (CIA) framework, and based on the notion of data liability. We identify the common requirements and develop several guidelines to achieve data accountability in the cloud. Once the data owner provides data, the service provider will have full access and permission rights, on the data. Using traditional access control mechanisms, after data rights are permitted, the data is in the hands of the service provider. We propose an algorithm, which gives the details of people accessing the data using the automated logging details through the JAR files.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Safeguarding the liabilities of Data Accessing in Cloud Computing

Kethan Harish Yekula
Kethan Harish Yekula Jawaharlala Nehru Technological University Kakinada(JNTUK)
Dr. Y.Venkateswarlu
Dr. Y.Venkateswarlu
Suneel Kumar Badugu
Suneel Kumar Badugu

Research Journals