Research Article | Open Access | Download PDF
Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P102 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P102
Towards Achieving Secured and Decentralized Accountability in Cloud Computing
Drishya S G , Kavitha Murugeshan
Citation :
Drishya S G , Kavitha Murugeshan, "Towards Achieving Secured and Decentralized Accountability in Cloud Computing," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1502-1507, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I5P102
Abstract
Cloud computing is an internet-based service where you can acquire networked storage space and computer resources as per your demand. An underlined feature in cloud computing is that users’ data are usually processed in a remote computer which they cannot access. This creates a fear of losing data in users which is a major obstacle in wide range use of cloud services. To attend to this problem, we propose an object oriented concept to protect a user data in a cloud network and also after delivery of a data to a client. Here we also provide security to cloud users by rendering JAR authentication.
Keywords
Cloud Computing, JAR(Java Archive), Java Running Environment, Accountability, cloud Service Provider.
References
[1] P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11,pp. 205-225, Aug. 1993.
[2] Smitha Sundareswaran, Anna C. Squicciarini, Member, IEEE, and Dan Lin “Ensuring Distributed Accountability for Data Sharing in the Cloud” Proc IEEE transactions on dependable and secure computing vol.9 no.4 year 2012
[3] B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004.
[4] OASIS Security Services Technical Committee, “Security Assertion Markup Language (saml) 2.0,” http://www.oasisopen.org/ committees/tc home.php?wg abbrev=security, 2012.
[5] R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, “A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
[6] B. Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int’l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.
[7] J. Hightower and G. Borriello, “Location Systems for Ubiquitous Computing,” Computer, vol. 34, no. 8, pp. 57-66, Aug. 2001.
[8] J.W. Holford, W.J. Caelli, and A.W. Rhodes, “Using Self- Defending Objects to Develop Security Aware Applications in Java,” Proc. 27th Australasian Conf. Computer Science, vol. 26, pp. 341-349, 2004. .
[9] R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, “Towards a Theory of Accountability and Audit,” Proc. 14th European Conf. Research in Computer Security (ESORICS), pp. 152-167, 2009.
[10] R. Kailar, “Accountability in Electronic Commerce Protocols,” IEEE Trans. Software Eng., vol. 22, no. 5, pp. 313-328, May 1996.
[11] W. Lee, A. Cinzia Squicciarini, and E. Bertino, “The Design and Evaluation of Accountable Grid Computing System,” Proc. 29th IEEE Int’l Conf. Distributed Computing Systems (ICDCS ’09), pp. 145-154, 2009.
[12] J.H. Lin, R.L. Geiger, R.R. Smith, A.W. Chan, and S. Wanchoo, Method for Authenticating a Java Archive (jar) for Portable Devices, US Patent 6,766,353, July 2004.
[13] T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice), first ed. O’ Reilly, 2009.
[14] M.C. Mont, S. Pearson, and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services,” Proc. Int’l Workshop Database and Expert Systems Applications (DEXA), pp. 377-382, 2003.
[15] S. Pearson and A. Charlesworth, “Accountability as a Way Forward for Privacy Protection in the Cloud,” Proc. First Int’l Conf. Cloud Computing, 2009.
[16] S. Pearson, Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing,” Proc. Int’l Conf. Cloud Computing (CloudCom), pp. 90-106, 2009.
[17] NTP: The Network Time Protocol, http://www.ntp.org/, 2012.
[18] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, 1993.
[19] Y. Chen et al., “Oblivious Hashing: A Stealthy Software Integrity Verification Primitive,” Proc. Int’l Workshop Information Hiding, F. Petitcolas, ed., pp. 400-414, 2003.