SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 8
Abstract
The growing trend towards grid computing and cloud computing provides enormous potential for allowing dynamic, distributed and data demanding applications such as sharing and processing of large-scale scientific data. Cloud computing is the use of computing of sources (hardware and software) that are delivered as a service over a network. A main characteristic of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not operate. It can be converted into a significant roadblock to the wide adoption of cloud services. To deal with this problem, we suggest a highly decentralized accountability framework to keep track of the actual usage of the user’s data in cloud. The Cloud Information Accountability framework projected in this work conducts automated logging and distributed auditing of relevant access performed by anything, passed out at any point of time at any cloud service provider. It has two main elements: logger and log harmonizer. The proposed methodology will take concern of the JAR file by converting the JAR into obfuscated code which will adds an additional layer of security to the communications. Apart from that we are going to enlarge the security of user’s data by provable data possessions for integrity verification
Authors and Affiliations
N. RAMESH , D. ANILM. E , M. KIRAN
Throughput Maximization for Optical Burst Switching Networks
Optical burst switching is a one-way reservation technique that provides connectionless transmission services. In OBS Data Traffic Discarded at immediate nodes is retransmitted by the sources. In this project work an...
A HIGH SPEED AND EFFICIENT DESIGN FOR BINARY NUMBER SQUARING USING DWANDWA YOGA
The complexity in implementing complex logic functions in hardware circuitry is to be reduced in order to perform large calculations with minimum delay. This paper presents a most efficient and high speed design fo...
Recursive Pseudo-Exhaustive Two-Pattern Generator
Pseudo-exhaustive pattern generators for built-in self-test (BIST) provide high fault coverage of detectable combinational faults with much fewer test vectors than exhaustive generation. In (n, k)-adjacent bit ps...
Inventory Management System Software for Public Universities in Ghana (IMSSPUG)
Managing inventories at Public Universities is one of the major challenges for higher educational institutions in Ghana. This is especially true for large, diverse and research-oriented institutions like the University f...
Wavelength Assignment In WDM Optical Networks
This paper analyses the wavelength assignment problem in optical WDM networks. First, the random wavelength assignment algorithm is compared with the first-fit wavelength assignment algorithm, then the sparse wavelength...