Ensuring Accountability for Data Sharing in Cloud

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-9 Number-4                          
Year of Publication : 2014
Authors : K. Rajendra Naidu , N.Naveen Kumar
DOI :  10.14445/22312803/IJCTT-V9P135

MLA

K. Rajendra Naidu , N.Naveen Kumar."Ensuring Accountability for Data Sharing in Cloud". International Journal of Computer Trends and Technology (IJCTT) V9(4):181-183, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is emerging rapidly as part of latest developments in communication trends and technology. It brought revolution in today’s world among key stakeholders like service providers and consumers. As a result, Leading IT industries and consumers changed the traditional way of doing business and swiftly started moving towards cloud computing technologies to lessen the burden of cost among consumers in a tailored fashion. The key challenge is how secure is the user information stored in the cloud and the mechanism to establish the information shared is to the responsible designated or authorized users as per the service agreement. To address this concern, in this paper we proposed the design with an aim of distributed accountability among key stakeholders like cloud service providers who store and manage the information, the owner who uploads the information into the cloud and the users who download the information as per the access polices. The owner will store the information in encrypted form using Advanced Encryption Standard (AES) encryption techniques, the service providers will ensure the users who register with cloud are identified and are allowed to download information if the identity is established. The cloud user is allowed to download the information once the process is followed and access controls are satisfied. For every information download request, the information will be decrypted on fly and also log will be generation in encrypted form. Owner will download the log periodically and decrypt it to get the downloaded details about the users. By periodic audits, we can ensure the information stored in the cloud is used judiciously by the responsible stakeholders as per the service level agreements.

References
[1] William Stallings, Pearson Education , 4th Edition, “Cryptography and Network Security” text book
[2] Atul Kahate, McGrawHill, 2th Edition ,“Cryptography and Network Security” text book
[3] Roger S Pressman, 6th edition, McGrawHill International Edition 2005, “Software Engineering: A practitioner’s approach”
[4] Simtha Sundareswaran, Anna C.Squicciarini “Ensuring Distributed Accountability for Data Sharing in the Cloud”, published in IEEE 2012, Vol 9, No 4
[5] P.T Jaeger, J.Lin, and J.M. Grimes,”Cloud Computing and Information Policy: Computing in a Policy Cloud?” J.Information Technology and Politics, vo5, no 3,pp.269-283,2009

Keywords
Cloud, Accountability, Security, Encryption, Data Sharing