Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Ensuring Distributed Accountability for Data Sharing in the Cloud pdf
Post: #1

Ensuring Distributed Accountability for Data Sharing in the Cloud

.pdf  Ensuring Distributed Accountability.pdf (Size: 807.97 KB / Downloads: 131)


CLOUD computing presents a new way to supplement the
current consumption and delivery model for IT
services based on the Internet, by providing for dynamically
scalable and often virtualized resources as a service over the
Internet. To date, there are a number of notable commercial
and individual cloud computing services, including Amazon,
Google, Microsoft, Yahoo, and Salesforce [19]. Details
of the services provided are abstracted from the users who
no longer need to be experts of technology infrastructure.
Moreover, users may not know the machines which actually
process and host their data. While enjoying the convenience
brought by this new technology, users also start worrying
about losing control of their own data. The data processed
on clouds are often outsourced, leading to a number of
issues related to accountability, including the handling of
personally identifiable information. Such fears are becoming
a significant barrier to the wide adoption of cloud
services [30].


In this section, we first review related works addressing the
privacy and security issues in the cloud. Then, we briefly
discuss works which adopt similar techniques as our
approach but serve for different purposes.

Cloud Privacy and Security

Cloud computing has raised a range of important privacy
and security issues [19], [25], [30]. Such issues are due to the
fact that, in the cloud, users’ data and applications
reside—at least for a certain amount of time—on the cloud
cluster which is owned and maintained by a third party.
Concerns arise since in the cloud it is not always clear to
individuals why their personal information is requested or
how it will be used or passed on to other parties. To date,
little work has been done in this space, in particular with
respect to accountability. Pearson et al. have proposed
accountability mechanisms to address privacy concerns of
end users [30] and then develop a privacy manager [31].
Their basic idea is that the user’s private data are sent to the
cloud in an encrypted form, and the processing is done on
the encrypted data. The output of the processing is
deobfuscated by the privacy manager to reveal the correct
result. However, the privacy manager provides only limited
features in that it does not guarantee protection once the
data are being disclosed.

Other Related Techniques

With respect to Java-based techniques for security, our
methods are related to self-defending objects (SDO) [17].
Self-defending objects are an extension of the object-oriented
programming paradigm, where software objects that offer
sensitive functions or hold sensitive data are responsible for
protecting those functions/data. Similarly, we also extend
the concepts of object-oriented programming. The key
difference in our implementations is that the authors still
rely on a centralized database to maintain the access records,
while the items being protected are held as separate files. In
previous work, we provided a Java-based approach to
prevent privacy leakage from indexing [39], which could be
integrated with the CIA framework proposed in this work
since they build on related architectures.
In terms of authentication techniques, Appel and Felten
[13] proposed the Proof-Carrying authentication (PCA)
framework. The PCA includes a high order logic language
that allows quantification over predicates, and focuses on
access control for web services. While related to ours to the
extent that it helps maintaining safe, high-performance,
mobile code, the PCA’s goal is highly different from our
research, as it focuses on validating code, rather than
monitoring content. Another work is by Mont et al. who
proposed an approach for strongly coupling content with
access control, using Identity-Based Encryption (IBE) [26].
We also leverage IBE techniques, but in a very different
way. We do not rely on IBE to bind the content with the
rules. Instead, we use it to provide strong guarantees for the
encrypted content and the log files, such as protection
against chosen plaintext and ciphertext attacks.

Marked Categories : ensuring distributed accountability for data sharing in cloud computing, other name for ensuring distributed accountability for data sharing in the cloud, ensuring distributed accountability for data sharing in the cloud this project clear concept, ensuring distributed accountability for data sharing in the cloud pdf, ensuring distributed accountability for data sharing in the cloud computing for 1st review, ensuring distributed accountability for data sharing in the cloud 1st review, ensuring distributed accountability for data sharing using cia, ensuring disabled accountability for data sharing in the cloud project in pdf,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  straddle bus seminar report pdf Guest 0 0 Today 07:06 AM
Last Post: Guest
  superconducting generators seminar report pdf Sandeepkp97 0 0 Yesterday 08:42 PM
Last Post: Sandeepkp97
  ground water recharge through waste water complete seminor report in pdf Guest 0 0 Yesterday 05:01 PM
Last Post: Guest
  download pdf file on four wheeler carburetor Guest 0 0 23-07-2017 01:18 PM
Last Post: Guest
  data flow diagram online college enrollment system pdf Guest 0 0 23-07-2017 09:24 AM
Last Post: Guest
  eb theft monitoring control system pdf Guest 0 0 22-07-2017 11:05 PM
Last Post: Guest
  electronic eye controlled security system pdf Guest 0 0 20-07-2017 10:37 AM
Last Post: Guest
  computer science quiz questions with answers in pdf Guest 0 0 19-07-2017 08:07 PM
Last Post: Guest
  hand operator double jar with mixie for full detail for pdf for free download Guest 0 0 17-07-2017 10:21 PM
Last Post: Guest
  srs with data flow diagram of irrigation system Guest 0 0 17-07-2017 07:18 PM
Last Post: Guest
This Page May Contain What is Ensuring Distributed Accountability for Data Sharing in the Cloud pdf And Latest Information/News About Ensuring Distributed Accountability for Data Sharing in the Cloud pdf,If Not ...Use Search to get more info about Ensuring Distributed Accountability for Data Sharing in the Cloud pdf Or Ask Here