SlideShare uma empresa Scribd logo
1 de 33
Cloud computing
Data sharing with accountability in the cloud


Group members:                    Guided by:
 k.Jeganathan                  Ms. chitra.v M.E.,
 A.susheenthiran
Objective
Cloud computing is a recent model for enabling
convenient, on-demand network access to a shared
pool of configurable computing resources.

Cloud computing can play a significant role in a
variety of areas including innovations, virtual worlds,
e-business, social networks, or search engines.
Abstract
The cloud enables efficient data sharing in the cloud.
Users fear that data are accessed and outsourced
without their permission.
To over come this problem we provide accountability
mechanism for both data owners as well as client.
Client needs to get access privilege from data owner
for accessing the data in the cloud.
Client gets access privilege from data owner and
retrieves the data from csp.
Contd..
Before that data owners should login to the csp and
stores their data in encrypted form along with client
access privilege , that is jar file.
Client logins to the csp only if he gets permission
from data owner for that client should be
authenticated.
A file which contains the information of each user
with access privileges and stores along with the data
file in the csp.
Existing system
The data processed on clouds are often outsourced,
leading to a number of issues related to
accountability, including the handling of personally
identifiable information.

Such fears are becoming a significant barrier to the
wide adoption of cloud services. Data’s are accessed
without the permission of data owner data are
modified and outsourced so owners fear of losing
their control.
Drawbacks
Accessing the data without the knowledge of data
owner.
Occurrence of data loss.
Data owner loss the control of their own data.
Possible of attacks like copying, man-in-the-middle
attack etc..
Integrity cannot be verified due to loss of control.
Proposed system
We propose a client accountability mechanism for
providing the control for the data owners.
Client can access the data only if the owners give
authentication and access privilege.
Data’s are stored in jar format for avoiding the loss of
data.
While the client access the data csp will generates a
log file which includes the details of client. Auditing
mechanisms can be done with the help of log file.
Advantages
Csp storage availability for data owners to store the data.
Separate authentication mechanism for clients with
access privilege control.
Only privileged clients can access the storage file.
Availability of secured data since the data's are stored in
csp.
Unauthorized clients cannot access the csp without the
data owner permission.
Batch auditing is performed.
To check the integrity log file will be sent to data owner
with the access privilege of the each client.
Data flow
Enhancement
Even though batch auditing was performed only by
verifying the access privilege, the data owner justifies
the data has been modified or not.

But the data owner doesn’t gain information about the
content in case of users whose write access privilege.
Suppose the client acts as hacker and provides the
correct information to the csp but hacks the content in
that cases data owner fear of losing their content.
Contd..
We implement MAC algorithm for integrity
verification, at the time of jar storage itself data
owner will generate MAC code for that data and store
it to the csp.

If unauthorized client outsource the data with the
modified content ,the csp will generates the MAC
code for that data and compare with original data
MAC code if the MAC is not same then integrity has
been brooked hence csp does not accept the content.
Algorithms used
MD5(message digest) algorithm for key generation to
each client during the accountability process of client.

PBE(password based encryption)algorithm for data
encryption and data decryption.

RSA algorithm for public and private key generation.

HMAC(hash message authentication code) algorithm
for integrity verification(future enhancement).
Modules
Accountability for cloud users.
Jar files storage in the CSP.
Logs file generation to data owner.
Integrity verification for data outsourcing.
Module description
Accountability for cloud users.
Client logins to the data owner and gets the access
privilege and data owner gathers client information
like file that he needs to access. To access the data
owner files first client should be an authenticated for
accessing those files. Client should register and login
to the data owner.
Data flow diagram

                  DATA OWNER
    CSP
                    DETAILS




 DATA OWNER            CLIENT
REGISTRATION        REGISTRATION
Contd..
Jar files storage in the CSP.
Data owner stores the data in the csp that is defined as
jar file storage; the file includes data file and client
information. Data will be encrypted before storing in
the csp. Data owners store the data along with the
client’s access privilege in the cloud service provider.
Owner’s data and access privilege are modified in jar
format and stored in csp. The JAR file includes a set of
simple access control rules specifying whether and how
the cloud servers and possibly other data stakeholders
(users, companies) are authorized to access the content
itself.
Client access
                MAC code
   policies




                 Encrypted
 Data owner
                   data




                 Creation of
     CSP
                   jar file
Contd..

   Logs file generation to data owner.
If client want to get data from csp while mean time it
   generates the log file to the data owner, log file consist
   of access privilege, by auditing the log file and clients
   access privilege data owner verifies the integrity of the
   data. Once the client gets access permission from the
   owner csp storage generates the log file to the data
   owner. The log file consist of clients access permission
   details along with the date. The integrity can be verified
   with the help of the generated log record.
Contd..
 Integrity verification for data outsourcing.
If the client wants to outsource the data ,it uploads
 the data and produces to the csp, the csp does not
 accept all data from client it generates a Mac code
 from the client data if that ,Mac code matches
 with the code generated by the data owner then
 only csp accepts to outsource it. We use HMAC
 algorithm for integrity verification, and thus
 integrity is verified for the content also.
System Requirements
Software Requirements
  OS             :    Windows Xp
  Language       :    Java
  IDE            :    NetBeans 6.9.1

Hardware Requirements
  System        :       Pentium IV2.4GHz.
  Hard Disk     :       250 GB.
  Monitor       :       15 VGA Color
  Mouse         :       Logitech.
  Ram           :       1GB.
Literature survey
A major feature of the cloud services is
that users’ data are usually processed
remotely in unknown machines that users
do not own or operate.
highly decentralized information
accountability framework to keep track of
the actual usage of the users’ data in the
cloud.
Contd..
Cloud services are delivered from data
centers located throughout the world.
Cloud computing is surrounded by many
security issues like securing data, and
examining the utilization of cloud by the
cloud computing vendors.
The boom in cloud computing has brought
lots of security challenges for the
consumers and service providers.
Contd..
Aims to identify the most vulnerable
security threats in cloud computing, which
will enable both end users and vendors to
know about the key security threats
associated with cloud computing.
The main advantage is cost effectiveness
for the implementation of the hardware
and software and this technology can
improve quality of current system
conclusion
By verifying the integrity a secure data sharing is
held in the cloud so that data owner need not fear
about the contents of him.
To strengthen user’s control
under extensive experimental studies
Further improvement provides efficiency and
effectiveness
References
D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen-
baum, J.Hendler, and G.J. Sussman, “Information
Accountability,” Comm. ACM, vol. 51, no. 6, pp. 82-
87, 2008.

D. Boneh and M.K. Franklin, “Identity-Based
Encryption from the Weil Pairing,” Proc. Int’l
Cryptology Conf. Advances in Cryptology,
 pp. 213-229, 2001.
Contd..
B. Chun and A.C. Bavier, “Decentralized Trust
Management and Accountability in Federated
Systems,” Proc. Ann. Hawaii Int’l Conf.
System Sciences (HICSS), 2004.

B. Crispo and G. Ruffo, “Reasoning about
Accountability within Delegation,” Proc. Third Int’l
Conf. Information and Comm. Security
(ICICS), pp. 251-260, 2001.
QUESTIONS ?
THANK YOU

Mais conteúdo relacionado

Mais procurados

Build Data Lakes & Analytics on AWS: Patterns & Best Practices
Build Data Lakes & Analytics on AWS: Patterns & Best PracticesBuild Data Lakes & Analytics on AWS: Patterns & Best Practices
Build Data Lakes & Analytics on AWS: Patterns & Best PracticesAmazon Web Services
 
Building a Big Data Pipeline
Building a Big Data PipelineBuilding a Big Data Pipeline
Building a Big Data PipelineJesus Rodriguez
 
Machine Learning with PyCarent + MLflow
Machine Learning with PyCarent + MLflowMachine Learning with PyCarent + MLflow
Machine Learning with PyCarent + MLflowDatabricks
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
 
Building a Data Processing Pipeline on AWS
Building a Data Processing Pipeline on AWSBuilding a Data Processing Pipeline on AWS
Building a Data Processing Pipeline on AWSAmazon Web Services
 
Azure IAAS architecture for beginners and developers - Part 1
Azure IAAS architecture for beginners and developers - Part 1Azure IAAS architecture for beginners and developers - Part 1
Azure IAAS architecture for beginners and developers - Part 1Malleswar Reddy
 
Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기
Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기
Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기Amazon Web Services Korea
 
Part 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An OverviewPart 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An OverviewNeeraj Kumar
 
Chapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.pptChapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.pptSubrata Kumer Paul
 
The "Big Data" Ecosystem at LinkedIn
The "Big Data" Ecosystem at LinkedInThe "Big Data" Ecosystem at LinkedIn
The "Big Data" Ecosystem at LinkedInSam Shah
 
CloudTrail ログの検索を爆速化してみた
CloudTrail ログの検索を爆速化してみたCloudTrail ログの検索を爆速化してみた
CloudTrail ログの検索を爆速化してみたYohei Azekatsu
 
Getting started with microsoft azure in 30 mins
Getting started with microsoft azure in 30 minsGetting started with microsoft azure in 30 mins
Getting started with microsoft azure in 30 minsIlyas F ☁☁☁
 
Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々
Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々
Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々torutk
 
Apache Mahout Architecture Overview
Apache Mahout Architecture OverviewApache Mahout Architecture Overview
Apache Mahout Architecture OverviewStefano Dalla Palma
 
5 Steps for Architecting a Data Lake
5 Steps for Architecting a Data Lake5 Steps for Architecting a Data Lake
5 Steps for Architecting a Data LakeMetroStar
 
Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...
Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...
Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...Databricks
 
Sample of Seller Property Report
Sample of Seller Property ReportSample of Seller Property Report
Sample of Seller Property ReportLuke Amoresano
 
Challenges in Building a Data Pipeline
Challenges in Building a Data PipelineChallenges in Building a Data Pipeline
Challenges in Building a Data PipelineManish Kumar
 

Mais procurados (20)

Build Data Lakes & Analytics on AWS: Patterns & Best Practices
Build Data Lakes & Analytics on AWS: Patterns & Best PracticesBuild Data Lakes & Analytics on AWS: Patterns & Best Practices
Build Data Lakes & Analytics on AWS: Patterns & Best Practices
 
Building a Big Data Pipeline
Building a Big Data PipelineBuilding a Big Data Pipeline
Building a Big Data Pipeline
 
Machine Learning with PyCarent + MLflow
Machine Learning with PyCarent + MLflowMachine Learning with PyCarent + MLflow
Machine Learning with PyCarent + MLflow
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Building a Data Processing Pipeline on AWS
Building a Data Processing Pipeline on AWSBuilding a Data Processing Pipeline on AWS
Building a Data Processing Pipeline on AWS
 
Azure IAAS architecture for beginners and developers - Part 1
Azure IAAS architecture for beginners and developers - Part 1Azure IAAS architecture for beginners and developers - Part 1
Azure IAAS architecture for beginners and developers - Part 1
 
Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기
Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기
Amazon EMR과 SageMaker를 이용하여 데이터를 준비하고 머신러닝 모델 개발 하기
 
Part 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An OverviewPart 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An Overview
 
Chapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.pptChapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.ppt
 
The "Big Data" Ecosystem at LinkedIn
The "Big Data" Ecosystem at LinkedInThe "Big Data" Ecosystem at LinkedIn
The "Big Data" Ecosystem at LinkedIn
 
CloudTrail ログの検索を爆速化してみた
CloudTrail ログの検索を爆速化してみたCloudTrail ログの検索を爆速化してみた
CloudTrail ログの検索を爆速化してみた
 
Getting started with microsoft azure in 30 mins
Getting started with microsoft azure in 30 minsGetting started with microsoft azure in 30 mins
Getting started with microsoft azure in 30 mins
 
Image mining
Image miningImage mining
Image mining
 
Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々
Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々
Jjug ccc 2016 spring i 5 javaデスクトッププログラムを云々
 
Apache Mahout Architecture Overview
Apache Mahout Architecture OverviewApache Mahout Architecture Overview
Apache Mahout Architecture Overview
 
5 Steps for Architecting a Data Lake
5 Steps for Architecting a Data Lake5 Steps for Architecting a Data Lake
5 Steps for Architecting a Data Lake
 
Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...
Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...
Text Extraction from Product Images Using State-of-the-Art Deep Learning Tech...
 
Sample of Seller Property Report
Sample of Seller Property ReportSample of Seller Property Report
Sample of Seller Property Report
 
MS 900 - Microsoft 365 Fundamentals
MS 900 - Microsoft 365 FundamentalsMS 900 - Microsoft 365 Fundamentals
MS 900 - Microsoft 365 Fundamentals
 
Challenges in Building a Data Pipeline
Challenges in Building a Data PipelineChallenges in Building a Data Pipeline
Challenges in Building a Data Pipeline
 

Destaque

Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilitySunkaraHariNarayana
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudChanakya Chandu
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 

Destaque (11)

Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
Presentech'10
Presentech'10Presentech'10
Presentech'10
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 

Semelhante a Cloud computing enables efficient data sharing with accountability

JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...IEEEGLOBALSOFTTECHNOLOGIES
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...IEEEGLOBALSOFTTECHNOLOGIES
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...Karyavardhi Sandra
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 

Semelhante a Cloud computing enables efficient data sharing with accountability (20)

Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 

Último

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Cloud computing enables efficient data sharing with accountability

  • 1. Cloud computing Data sharing with accountability in the cloud Group members: Guided by: k.Jeganathan Ms. chitra.v M.E., A.susheenthiran
  • 2. Objective Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud computing can play a significant role in a variety of areas including innovations, virtual worlds, e-business, social networks, or search engines.
  • 3. Abstract The cloud enables efficient data sharing in the cloud. Users fear that data are accessed and outsourced without their permission. To over come this problem we provide accountability mechanism for both data owners as well as client. Client needs to get access privilege from data owner for accessing the data in the cloud. Client gets access privilege from data owner and retrieves the data from csp.
  • 4. Contd.. Before that data owners should login to the csp and stores their data in encrypted form along with client access privilege , that is jar file. Client logins to the csp only if he gets permission from data owner for that client should be authenticated. A file which contains the information of each user with access privileges and stores along with the data file in the csp.
  • 5. Existing system The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. Such fears are becoming a significant barrier to the wide adoption of cloud services. Data’s are accessed without the permission of data owner data are modified and outsourced so owners fear of losing their control.
  • 6. Drawbacks Accessing the data without the knowledge of data owner. Occurrence of data loss. Data owner loss the control of their own data. Possible of attacks like copying, man-in-the-middle attack etc.. Integrity cannot be verified due to loss of control.
  • 7. Proposed system We propose a client accountability mechanism for providing the control for the data owners. Client can access the data only if the owners give authentication and access privilege. Data’s are stored in jar format for avoiding the loss of data. While the client access the data csp will generates a log file which includes the details of client. Auditing mechanisms can be done with the help of log file.
  • 8. Advantages Csp storage availability for data owners to store the data. Separate authentication mechanism for clients with access privilege control. Only privileged clients can access the storage file. Availability of secured data since the data's are stored in csp. Unauthorized clients cannot access the csp without the data owner permission. Batch auditing is performed. To check the integrity log file will be sent to data owner with the access privilege of the each client.
  • 10. Enhancement Even though batch auditing was performed only by verifying the access privilege, the data owner justifies the data has been modified or not. But the data owner doesn’t gain information about the content in case of users whose write access privilege. Suppose the client acts as hacker and provides the correct information to the csp but hacks the content in that cases data owner fear of losing their content.
  • 11. Contd.. We implement MAC algorithm for integrity verification, at the time of jar storage itself data owner will generate MAC code for that data and store it to the csp. If unauthorized client outsource the data with the modified content ,the csp will generates the MAC code for that data and compare with original data MAC code if the MAC is not same then integrity has been brooked hence csp does not accept the content.
  • 12. Algorithms used MD5(message digest) algorithm for key generation to each client during the accountability process of client. PBE(password based encryption)algorithm for data encryption and data decryption. RSA algorithm for public and private key generation. HMAC(hash message authentication code) algorithm for integrity verification(future enhancement).
  • 13. Modules Accountability for cloud users. Jar files storage in the CSP. Logs file generation to data owner. Integrity verification for data outsourcing.
  • 14. Module description Accountability for cloud users. Client logins to the data owner and gets the access privilege and data owner gathers client information like file that he needs to access. To access the data owner files first client should be an authenticated for accessing those files. Client should register and login to the data owner.
  • 15. Data flow diagram DATA OWNER CSP DETAILS DATA OWNER CLIENT REGISTRATION REGISTRATION
  • 16. Contd.. Jar files storage in the CSP. Data owner stores the data in the csp that is defined as jar file storage; the file includes data file and client information. Data will be encrypted before storing in the csp. Data owners store the data along with the client’s access privilege in the cloud service provider. Owner’s data and access privilege are modified in jar format and stored in csp. The JAR file includes a set of simple access control rules specifying whether and how the cloud servers and possibly other data stakeholders (users, companies) are authorized to access the content itself.
  • 17. Client access MAC code policies Encrypted Data owner data Creation of CSP jar file
  • 18. Contd.. Logs file generation to data owner. If client want to get data from csp while mean time it generates the log file to the data owner, log file consist of access privilege, by auditing the log file and clients access privilege data owner verifies the integrity of the data. Once the client gets access permission from the owner csp storage generates the log file to the data owner. The log file consist of clients access permission details along with the date. The integrity can be verified with the help of the generated log record.
  • 19. Contd.. Integrity verification for data outsourcing. If the client wants to outsource the data ,it uploads the data and produces to the csp, the csp does not accept all data from client it generates a Mac code from the client data if that ,Mac code matches with the code generated by the data owner then only csp accepts to outsource it. We use HMAC algorithm for integrity verification, and thus integrity is verified for the content also.
  • 20. System Requirements Software Requirements OS : Windows Xp Language : Java IDE : NetBeans 6.9.1 Hardware Requirements System : Pentium IV2.4GHz. Hard Disk : 250 GB. Monitor : 15 VGA Color Mouse : Logitech. Ram : 1GB.
  • 21. Literature survey A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud.
  • 22. Contd.. Cloud services are delivered from data centers located throughout the world. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. The boom in cloud computing has brought lots of security challenges for the consumers and service providers.
  • 23. Contd.. Aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing. The main advantage is cost effectiveness for the implementation of the hardware and software and this technology can improve quality of current system
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. conclusion By verifying the integrity a secure data sharing is held in the cloud so that data owner need not fear about the contents of him. To strengthen user’s control under extensive experimental studies Further improvement provides efficiency and effectiveness
  • 30. References D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen- baum, J.Hendler, and G.J. Sussman, “Information Accountability,” Comm. ACM, vol. 51, no. 6, pp. 82- 87, 2008. D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.
  • 31. Contd.. B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004. B. Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int’l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.