CFP last date
20 December 2024
Reseach Article

Secure Data Processing in Cloud Computing

by Snehal P. Suryawanshi, Anant M. Bagade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 5
Year of Publication: 2013
Authors: Snehal P. Suryawanshi, Anant M. Bagade
10.5120/13244-0702

Snehal P. Suryawanshi, Anant M. Bagade . Secure Data Processing in Cloud Computing. International Journal of Computer Applications. 76, 5 ( August 2013), 23-26. DOI=10.5120/13244-0702

@article{ 10.5120/13244-0702,
author = { Snehal P. Suryawanshi, Anant M. Bagade },
title = { Secure Data Processing in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 5 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number5/13244-0702/ },
doi = { 10.5120/13244-0702 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:07.743007+05:30
%A Snehal P. Suryawanshi
%A Anant M. Bagade
%T Secure Data Processing in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 5
%P 23-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is type of system that uses sharing resource, it cannot uses local sever or personal devices for application, it uses single network to share resources. This services are provided to user's computer and laptops using internet. Main feature of the cloud services is that user's data are usually process on machines that users does not know. It can become a main problem for growing cloud services. This work giving a highly decentralized framework to keep track of the actual usage of the data owner's data in the cloud. The Cloud Information Accountability framework given in this paper conducts automated logging and distributed auditing of access of data by any user, carried out at any time . It has two major components: logger and log harmonizer. Data owner will get confirmation that his data is handled according to his desire.

References
  1. SmithaSundareswaran, Anna C. Squicciarini and Dan Lin, "Ensuring Distributed Accountability for Data Sharing in the Cloud," IEEE Transaction on dependable a secure computing, VOL. 9, NO. 4, pg 556-568, 2012.
  2. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. EuropeanConf. Research in Computer Security (ESORICS), pp. 355-370, 2009.
  3. M. Xu, X. Jiang, R. Sandhu, and X. Zhang, "Towards a VMM Based Usage Control Framework for OS Kernel Integrity Protection," SACMAT '07: Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 71-80, 2007.
  4. Ryan K L Ko, Peter Jagadpramana, Miranda Mowbray, Siani Pearson, Markus Kirchberg, Qianhui Liang and Bu Sung Lee,"TrustCloud: A Framework for Accountability and Trust in Cloud Computing," 2nd IEEE Cloud Forum for Practitioners (IEEE ICFP 2011), Washington DC, USA,pp 1-8.
  5. A. Squicciarini, S. Sundareswaran, and D. Lin, "Preventing Information Leakage from Indexing in the Cloud," Proc. IEEE Int'l Conf. Cloud Computing, 2010.
  6. R. Corin, S. Etalle, J. I. den Hartog, G. Lenzini, and I. Staicu, "ALogic for Auditing Accountability in Decentralized Systems,"Proc. IFIP TC1 WG1. 7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
  7. Jia Xu and Ee-Chien Chang," Towards Efficient Proofs of Retrievability", ASIACCS '12, May 2–4, 2012.
  8. Trusted Java Virtual Machine IBM, http://www. almaden. ibm. com/cs/projects/jvm/, 2012.
  9. Eucalyptus Systems, http://www. eucalyptus. com/, 2012.
  10. Amazon Cloud, http://aws. amazon. com
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Accountability Security Privacy ICIA Framework