Security Of Cloud Data With Logging Using Jar File
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Now-a-days, Cloud Computing technology is growing at a very fast pace. Currently, most of the people are using Cloud Computing technology. Cloud computing allows extremely scalable services to be consumed at ease over the Internet associated on an as-needed basis. Most important feature of the cloud services is that users’ data are sometimes processed remotely in some unknown machines that the users don't own or operate. But with all the convenience brought by this new rising technology, fear of users of losing the control over their own data (for instance, financial and health data) is becoming a significant barrier to the wide adoption of cloud services. To unravel the problem above in this paper, we offer effective mechanism of using Cloud Information Accountability framework to keep the track of actual usage of users’ data within the cloud. Specifically, we propose associate object-centered approach that allows enclosing our logging mechanism together with users’ data and the policies. Accountability is none but checking of authorization policies and it is vital for transparent data access. We provide a mechanism of automated logging using JAR programming which improves privacy and security of data in the cloud. We also provide a distributed auditing mechanism in order to strengthen the user's control over their data. We also provide problems of a user along with solutions that demonstrate the efficiency and effectiveness of our proposed system.
Authors and Affiliations
Bhagyashree Shendkar, Sankalp Bhagat, Rohan Rane, Monali khandare
Design and Implementation of FFT Processor for OFDMA System Using FPGA
Orthogonal Frequency Division Multiplexing(OFDM),is a frequency-division multiplexing(FDM) scheme utilized as a digital multi-carrier modulation(MCM) method.A large number of closely-spaced orthogonal sub-carriers are u...
slugMitigation of flooding Attack in MANET using NS-3
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, per...
EEG Signal Classification and Drowsiness Detection in Driver
traffic accidents are increasing due to driver’s consumption of alcohol or due to drowsiness. Breathalyzers are used for the purpose of alcohol detection, these device measure the amount of alcohol rather than loss of f...
Feature Based Opinion Analysis of Chinese Mobile Reviews
Sentiment analysis also termed as opinion mining is a systematic process to identifying quantifying and subjective information. This domain mainly focus on the on-line reviews and different user generated content is a v...
Image Quality Assessment for Multi Exposure Fused Images
Multi-exposure picture combination (MEF) is viewed as a successful quality improvement procedure generally received in buyer gadgets. In this paper, we do a subjective client study to assess the nature of pictures creat...