Ensuring Distruted Accountability For data sharing in cloud
Ensuring Distruted.pptx (Size: 247.54 KB / Downloads: 202)
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data is usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this paper, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users’ data will trigger authentication and automated logging local to the JARs. To strengthen user’s control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.
Objective and Target
In this project, we are going to develop a centralized logging for users. By doing this, all users can share the document downloaded from the cloud. And cost effectiveness of the data accessing from the cloud will be reduced.
While working with cloud users’ fears of losing control of their own data can become a significant barrier to the wide adoption of cloud services.
To address this problem, in this paper, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud.
Cloud provides the space for users to store data and use the services that are available in the cloud. While enjoying the convenience brought by this new technology, users also start worrying about losing control of their own data.
The data processed on clouds is often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information.
Entities are allowed to join and leave the cloud in a flexible manner. As a result, data handling in the cloud goes through a complex and dynamic hierarchical service chain which does not exist in conventional environments.
The privacy protection technologies which are built on the hide-it-or-lose-it perspective have the possibility of data lose.
1. We propose a novel automatic and enforceable logging mechanism in the cloud. To our knowledge, this is the first time a systematic approach to data accountability through the novel usage of JAR files is proposed.
Our proposed architecture is platform-independent and highly decentralized, in that it does not require any dedicated authentication or storage system in place.
We go beyond traditional access control in that we provide a certain degree of usage control for the protected data after it is delivered to the receiver.
The results demonstrate the efficiency, scalability and granularity of our approach. We also provide a detailed security analysis and discuss the reliability and strength of our architecture.
We proposed innovative approaches for automatically logging any access to the data in the cloud together with an auditing mechanism. Our approach allows the data owner to not only audit his content but also enforce strong back-end protection if needed. Moreover, one of the main features of our work is that it enables the data owner to audit even those copies of its data that were made without his knowledge.