A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR file Authentication

@article{Angaiyarkanni2013ASD,
  title={A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR file Authentication},
  author={P. Angaiyarkanni},
  journal={IOSR Journal of Computer Engineering},
  year={2013},
  volume={8},
  pages={49-55}
}
  • P. Angaiyarkanni
  • Published 2013
  • Computer Science
  • IOSR Journal of Computer Engineering
Cloud computing has the great potential to dramatically change the landscape of the current IT industry. [...] Key Method Log data analysis is provided with indexing and aggregation functions. The system includes the data and executable access control model. KeywordsCloud computing, Accountability, CIA Framework, JAR Files, Data sharing.Expand

References

SHOWING 1-10 OF 11 REFERENCES
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
TLDR
The task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud is considered, and an elegant verification scheme is constructed for seamless integration of these two salient features in the protocol design. Expand
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
TLDR
To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design. Expand
Ensuring Distributed Accountability for Data Sharing in the Cloud
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processedExpand
Preventing Information Leakage from Indexing in the Cloud
TLDR
A three-tier data protection architecture is designed to accommodate various levels of privacy concerns by users and a novel portable data binding technique is developed to ensure strong enforcement of users' privacy requirements at server side. Expand
Provable data possession at untrusted stores
TLDR
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data. Expand
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
TLDR
This paper describes a provenance-aware system prototype that implements provenance tracking of data writes at the application layer, which makes it extremely easy to deploy and presents empirical results that show the run-time overhead of the approach to recording provenance with confidentiality and integrity guarantees ranges from 1%-13%. Expand
Cloud Computing and Information Policy: Computing in a Policy Cloud?
TLDR
The nature and potential of cloud computing, the policy issues raised, and research questions related to cloud computing and policy are examined as a part of larger issues of public policy attempting to respond to rapid technological evolution. Expand
Policy Evolution in Distributed Usage Control
TLDR
This work provides a role-based re-distribution model for usage control that encompasses strengthening both rights and duties and introduces orderings for events and parameter values to show how both Rights and duties can be strengthened with the traditional abstraction of trace inclusion. Expand
Accountability as a Way Forward for Privacy Protection in the Cloud
TLDR
This paper proposes an approach in which procedural and technical solutions are co-designed to demonstrate accountability as a path forward to resolving jurisdictional privacy and security risks within the cloud. Expand
On usage control for GRID systems
TLDR
A formal model, an architecture and a prototype implementation for usage control on GRID systems, which uses as policy specification language a process description language and shows how this is suitable to model the usage policy models of the original UCON model. Expand
...
1
2
...