CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Achieving Accountability and Secure Logging to Increase Trust in Cloud Environment

by Manish M. Potey, Deepti D. Nikumbh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 17
Year of Publication: 2013
Authors: Manish M. Potey, Deepti D. Nikumbh
10.5120/12837-0166

Manish M. Potey, Deepti D. Nikumbh . Achieving Accountability and Secure Logging to Increase Trust in Cloud Environment. International Journal of Computer Applications. 73, 17 ( July 2013), 49-56. DOI=10.5120/12837-0166

@article{ 10.5120/12837-0166,
author = { Manish M. Potey, Deepti D. Nikumbh },
title = { Achieving Accountability and Secure Logging to Increase Trust in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 17 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 49-56 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number17/12837-0166/ },
doi = { 10.5120/12837-0166 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:24.581344+05:30
%A Manish M. Potey
%A Deepti D. Nikumbh
%T Achieving Accountability and Secure Logging to Increase Trust in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 17
%P 49-56
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Clouds are becoming an interesting alternative to dedicated IT infrastructure. The advantages of cloud computing are appealing, but it also carries certain degree of risk for its customers as well as the cloud service providers. There is a lack of trust in cloud by potential customers which acts as a barrier in widespread adoption of cloud computing technology. In order to increase trust in cloud, we need to make clouds transparent and accountable. However, current systems does not provide full transparency and accountability. They are unable to track user activities and data transfers effectively within cloud environment. In this paper we propose a framework which achieves accountability by generating logs for every user activity, further we provide a secure logging mechanism for safeguarding of logs, thus protecting confidentiality of users and integrity of logs from dishonest cloud providers.

References
  1. A. Haeverlen, and, "A Case for the Accountable Cloud",ACM SIGOPS Operating System Review,vol. 44,pp. 52-57,2010.
  2. C. Cachin, I. Keidar, A. Shaer, "Trusting the Cloud", ACM SIGACT News, vol. 40, No. 2, June 2009.
  3. K. L. Ryan Ko, P. Jagadpramana, M. Mowbray, S. perasons, M. Kirchberg, Q. Liang, B. S. Lee "TrustCloud-A freamework for accountability and trust in cloud computing",IEEE 2nd Cloud Forum for Practitioners,IEEE Computer Society, Washington DC, USA, 7-8 July 2011.
  4. J. K. Muppala,D. Shukla,S. K. Patil, "Establishing Trust in Public Clouds", J Inform Tech Softw Eng,2012.
  5. S. Zawoad, A. K. Dutta and R. Hasan, "SecLaas:Secure Logging-as-a-Service for Cloud Forensics", ACM Symposium on Information, Computer and Communications Security (ASIACCS) Feburary 25,2013.
  6. O. Q. Zhang, K. L. Ryan Ko, M. Kirchberg and B. S. Lee, "How to Track Your Data:The Case for Cloud Computing Provenance",January 21, 2012.
  7. K. L. Ryan Ko, P. Jagadpramana and B. S. Lee "Flogger:A File-centric Logger For Monitoring File Access and Transfer within Cloud Computing Environments",In Proc. IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communication,pp. 765-771 August 6,2011.
  8. S. Pearson and A. Charlesworth and, "Accountability as a Way Forward for Privacy Protection in the Cloud", Springer LNCS 5931, pp. 131–144, December 2009.
  9. S. Pearson, "Towards Accountability in the Cloud",IEEE Internet Computing, IEEE Computer Society, vol. 15, no. 4, pp. 64-69, July/August 2011.
  10. N. Michalakis,R. Soule and R. Grimm," Ensuring Content Integrity For Untrusted Peer to Peer Content Distribution Network",In Proc. NSDI,April 2009.
  11. A. Haeberlen, P. Kuznetsov, P. Druschel,"PeerReview:Practical Accountability for Distributed Systems",In Proc. SOSP,October 2007.
  12. HyTrust,"HyTrust Appliance",2010; http:/www. hytrust. com/product/overview/.
  13. CloudKick,"CloudKick-Cloud Monitoring and Management",2011 http:/www. cloudkick. com.
  14. D. Ma, G. Tsudik,"A New Approach to secure Logging",Trans. Storage,5(1):2:1,March 2009.
  15. R. Marty,"Cloud Application Logging For Forensics",In Proc. ACM Symposium on Applied Computing,pp 178-184,2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing logging accountability trusted cloud detective mechanism files centric logging cloud forensics