International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P122 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P122

Cloud Information Accountability Frameworks for Data Sharing in Cloud - A Review


Shraddha B. Toney, Sandeep U.Kadam

Citation :

Shraddha B. Toney, Sandeep U.Kadam, "Cloud Information Accountability Frameworks for Data Sharing in Cloud - A Review," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 305-310, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P122

Abstract

The difficulty of how to provide proper security and privacy protection for cloud computing is very important, and as yet not solved. In this paper we review the cloud information accountability framework for the data sharing in which procedural and technical solutions are co-designed to demonstrate accountability by the various researchers to resolving privacy and security risks within the cloud. Cloud computing is a set of services that are provided to a end user over on a leased basis over a network. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It moves the application software and databases to the most data centers, where the controller of the data and services may not be fully trustworthy which have not been well understood. This paper presents a review on new way to supplement the current consumption and delivery model for IT services based on the Internet, by providing for dynamically scalable framework and often virtualized resources as a service over the Internet. By the time there are a number of notable commercial and individual cloud computing services, including Google, Microsoft and Yahoo. Details of the services provided are abstracted from the users who no longer need to be experts of technology infrastructure. Moreover, users may not know the machines which actually process and host own data. While enjoying the convenience brought by this new technology, end users also start worrying about security of their own personal and important data. The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information.

Keywords

Infrastructure, IT, Security, Accountability, Thirt party auditor, Network issue, cloud computing and Privacy.

References

[1] Solove, D.J.: A Taxonomy of Privacy, University of Pennsylvania Law Review, vol. 154, no 3, p. 477-564. (2006) 
[2] Siani Pearsonand  Andrew Charlesworth”  Accountability as a Way Forward for Privacy Protection in the Cloud” 
[3] Elias Nhoustis, John R. Rice, Efsrafstratiosgallopouls,Randall Bramley (Editors), Enabling Technologies for Computational Science Frameworks, Middleware and Environments, Kluwer-Academic Publishers, Hardbound, ISBN 0-7923-7809-1, 2000.
[4]  A Cloud Com 2009, Beijing, Springer LNCS, December 2009.5. Ackerman, M., Darrell, T., Weitzner, D.: Privacy in Context. Human Computer Interaction, vol. 16, no.2, pp. 167-176 (2001) 
[5] The Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud
[6] Computing.http://www.cloudsecurityalliance.org/guidance/csaguide.pd f (2009)
[7] Mr.Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum, http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.p df (2009) 
[8] Mr.Marco Casassa Mont, Siani Pearson, Pete Bramhall , Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services HPL-2003-49 March 19th , 2003*
[9] MRr.Abrams, M.: A Perspective:   Data Flow Governance in Asia Pacific & APEC Framework. http://ec.europa.eu/justice_home/news/information_dossiers/personal_ data_workshop/speeches_en.htm (2008)
[10] Kohl, U.: Jurisdiction and the Internet, Cambridge University Press (2007
[11] Mr. Mowbray, M.: The Fog over the Grimpen Mire: Cloud Computing and the Law. Script-ed Journal of Law, Technology and Society, vol. 6, no.1, April (2009) 
[12] Mr. Hall, J.A. & Liedtka, S.L.: The Sarbanes-Oxley Act: implications for large-scale IT outsourcing. In: Communications of the ACM, vol. 50, no.3, pp. 95-100 (2007) 
[13] Mr. McKinley, P.K., Samimi, F.A., Shapiro, J.K., Chiping T.: Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. Dependable, Autonomic and Secure Computing, IEEE, pp.341-348, (2006)  [14] Conn,R. ,Cederquist, J.G., Dekker, M.A.C., Etalle, S., den Hartog, J.I.: An audit logic for accountability. In: Policies for Distributed Systems and Networks, IEEE, pp. 34-43 (2005)
[15] UK Information Commissioner's Office A Report on the Surveillance Society (2006)
[16] Charlesworth, A.: The Future of UK Data Protection Regulation. Information Security Technical Report vol. 11, no.1. pp. 46-54 (2006) 
[17] Charlesworth, A. Information Privacy Law in the European Union: E Pluribus Unum or Ex Uno Plures. Hastings Law Review, vol. 54, pp. 931-969 (2003), [18] Conn R. Dekker Cederquist, J.G., , M.A.C., Etalle, S., den Hartog, J.I.: An audit logic for accountability. In: Policies for Distributed Systems and Networks, IEEE, pp. 34-43 (2005)