ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CLOUD INFORMATION ACCOUNTABILITY (CIA) FRAMEWORK ENSURING ACCOUNTABILITY OF DATA IN CLOUD AND SECURITY IN END TO END PROCESS IN CLOUD TERMINOLOGY

Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 4)

Publication Date:

Authors : ; ;

Page : 376-385

Keywords : Cloud computing; Framework; Accountability; Data sharing; Cloud Service Provider.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this paper, we put forward a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. Though the Cloud Service Provider (CSP) gives the privacy and veracity of the data; this tracks the actual usage of the user's data in the cloud by using novel extremely decentralized framework data and policies. A object-centered approach that enables enclosing our logging mechanism together with users' data and policies. By leveraging the JAR programmable aptitude to both creates a dynamic and peripatetic object. The privacy protection technologies, information accountability focuses on keeping the data usage transparent and perceptible. Our proposed CIA framework provides end-to end accountability in a highly distributed trend. One of them an innovative feature of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication, and security issues.

Last modified: 2017-10-06 16:53:03