National Conference on Innovative Paradigms in Engineering & Technology 2013 |
Foundation of Computer Science USA |
NCIPET2013 - Number 1 |
December 2013 |
Authors: Sheetal Deshpande, Deepali D. Gatade |
e97df84d-365a-46f5-b760-182c24566d72 |
Sheetal Deshpande, Deepali D. Gatade . A Survey and Analysis for Accountability and Privacy of Shared Data in the Cloud. National Conference on Innovative Paradigms in Engineering & Technology 2013. NCIPET2013, 1 (December 2013), 22-27.
Cloud computing is an attractive utility-computing paradigm based on Service Level Agreements (SLAs) that is experiencing rapid uptake in the commercial sector. Cloud systems offer low cost public access to vast proprietary compute, storage, and network resources. These systems provide per-user and per-application isolation and customization via a service interface that is typically implemented using high-level language technologies, well-defined APIs, and web services. Web interactions usually require the exchange of personal and confidential information for a variety of purposes, including enabling business transactions and the provisioning of services. A key issue affecting these interactions is the lack of trust and control on how data is going to be used and processed by the entities that receive this data. The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. Information accountability has become a major concern for the data on the cloud. To provide information accountability for data on the cloud some major goals need to achieved: • Fair : Data available to user hosted by CSP has to fair as given to them by cloud customer. • Consistent : Data integrity and consistency must be preserved i. e. CSP should not discard rarely accessed data without being detected in a timely fashion • Reliable : CSP should not attempt to hide data loss incidents and also leak the data to untrusted sources. • Complete : CSP should not behave unfaithfully towards the cloud customer by deleting data which is rarely accessed or not fetching them good business. Different methods are introduced to provide integrity, accountability and security for data on clouds Some are applicable at platform-level, some are implementable on CSP-side, while some are outsourced to TPA(Third Party Auditor) who audits on behalf of the user. These methods use either encryption policies or Java policies for authentication using nested JARs or sometimes even both together are used.