Survey on Data Sharing In the Cloud Using Distributed Accountability
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 10
Abstract
In cloud computing, resources are share among multiple clients and it is important for cloud service provider to allocate these resources for such clients. Cloud computing is an infrastructure that provides on demand network services. In this technology, user fears about loss of his own personal data. To solve this problem, we propose data accountability approach which is used to keep track of usage of user’s data in the cloud. We create JAR programmable files to ensure user’s data authentication and automated log in JARs. Using this mechanism owner may know his data is handled as per his requirement only. By auditing method, we can ensure that the information which was stored in the cloud is used by the responsible persons as per the service level agreements. In this paper, this distributed accountability concept is applied to generic file types which contain not only image data type but also all types of data. It also supports different variety of security policies, like indexing policies for text files, usage control policies for executable files. It describes an application, which maintains log records of data usage stored on cloud. It also provides strong protection to owner’s data by compiling jar of that file.
Authors and Affiliations
Miss. Priyanka More , Miss. Mayuri Lingayat
PCB Defect Detection Using Image Enhancement
Printed circuit board (PCB) mechanically supports and electrically connects electronic components using conductive tracks. Using PCB chances of miswriting or short circuited wiring are minimized .The location of electron...
DIVERSE ROUTING IN NETWORKS WITHOUT DISJOINTNESS CONSTRAINT USING PROBABILISTIC FAILURES
To develop a various routing theme for coping with multiple, presumably related to failures. Isolated single link failures is effectively restrained disjoint path protection, however mechanisms for sick from multiple fai...
Fault Tolerance in Wireless Sensor Networks using Stiffed Delaunay Triangulation
In this chapter, we introduce fault tolerance in Wireless Sensor Networks. Firstly, we start with a short description of sensor networks, fault tolerance and its different techniques. Then we discuss the different phases...
Performance Evaluation of AQM Algorithms for PGM based group communication in PIM-DM Multicasting Network
Active Queue Management (AQM) can potentially reduce packet loss rate in the Internet. This is used by routers for control congestion, where packets are dropped before queues become full. In this paper, comparative study...
Handwritten Character Recognition for major Indian Scripts:A Survey
Character Recognition is an active field of research today. It comprises of Pattern Recognition and Image Processing. Character Recognition has gained enormous attention due to its application in various fields. Characte...