Security Of Cloud Data With Logging Using Jar File

Abstract

Now-a-days, Cloud Computing technology is growing at a very fast pace. Currently, most of the people are using Cloud Computing technology. Cloud computing allows extremely scalable services to be consumed at ease over the Internet associated on an as-needed basis. Most important feature of the cloud services is that users’ data are sometimes processed remotely in some unknown machines that the users don't own or operate. But with all the convenience brought by this new rising technology, fear of users of losing the control over their own data (for instance, financial and health data) is becoming a significant barrier to the wide adoption of cloud services. To unravel the problem above in this paper, we offer effective mechanism of using Cloud Information Accountability framework to keep the track of actual usage of users’ data within the cloud. Specifically, we propose associate object-centered approach that allows enclosing our logging mechanism together with users’ data and the policies. Accountability is none but checking of authorization policies and it is vital for transparent data access. We provide a mechanism of automated logging using JAR programming which improves privacy and security of data in the cloud. We also provide a distributed auditing mechanism in order to strengthen the user's control over their data. We also provide problems of a user along with solutions that demonstrate the efficiency and effectiveness of our proposed system.

Authors and Affiliations

Bhagyashree Shendkar, Sankalp Bhagat, Rohan Rane, Monali khandare

Keywords

Related Articles

Design and Implementation of FFT Processor for OFDMA System Using FPGA

Orthogonal Frequency Division Multiplexing(OFDM),is a frequency-division multiplexing(FDM) scheme utilized as a digital multi-carrier modulation(MCM) method.A large number of closely-spaced orthogonal sub-carriers are u...

slugMitigation of flooding Attack in MANET using NS-3

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, per...

EEG Signal Classification and Drowsiness Detection in Driver

traffic accidents are increasing due to driver’s consumption of alcohol or due to drowsiness. Breathalyzers are used for the purpose of alcohol detection, these device measure the amount of alcohol rather than loss of f...

Feature Based Opinion Analysis of Chinese Mobile Reviews

Sentiment analysis also termed as opinion mining is a systematic process to identifying quantifying and subjective information. This domain mainly focus on the on-line reviews and different user generated content is a v...

Image Quality Assessment for Multi Exposure Fused Images

Multi-exposure picture combination (MEF) is viewed as a successful quality improvement procedure generally received in buyer gadgets. In this paper, we do a subjective client study to assess the nature of pictures creat...

Download PDF file
  • EP ID EP20156
  • DOI -
  • Views 255
  • Downloads 5

How To Cite

Bhagyashree Shendkar, Sankalp Bhagat, Rohan Rane, Monali khandare (2015). Security Of Cloud Data With Logging Using Jar File. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk./articles/-A-20156