M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Cloud computing is a distributed model which provides shared pool of resources and services to the customers. Cloud computing can easily provide services through network and these are on demand services to the users. User stores different kinds of data on the cloud which can be sensitive or private and should not be disclose to unauthorized users. That is why the data owner needs to know that who is accessing his data without his required permission and whether his data is handled according to the service level agreement which is made at the time when user registers for the services in cloud. For that data owner should know the current usage of his data in cloud through accountability. In this paper, we are focusing on accountability of outsourced data in cloud. Accountability is verification of authentication and authorization policies. It consists of automated logging and auditing of the data usage. In automated logging, any access to the owners data will trigger authentication and log is generated automatically. These logs generated are sent to the data owner so that he can audit his data usage by analyzing the log records. After analyzing the log records, if data owner finds any unauthorized access to the outsourced data then he will convey this to the cloud service provider in form of audit file. Cloud service provider will read the audit file and take the decisions according to the type of access made to the outsourced data.
Keywords: Cloud computing, accountability, logs, authentication, audit, security
Edition: Volume 4 Issue 7, July 2015
Pages: 2483 - 2487
How to Cite this Article?
Nitin P. Doiphode, Hemlata Channe, "Accountability of Data usage in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156952, Volume 4 Issue 7, July 2015, 2483 - 2487
135 PDF Views | 87 PDF Downloads
Similar Articles with Keyword 'Cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'accountability'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1253 - 1261Data Hopping in Malicious Environment
S Mohammed Ghouse, Sheethal R
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013
Pages: 188 - 190Accountability for Data Sharing in the Cloud
Anuja Musale, Chaitra Rane, Nikita Zambad, Anuja Birari
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 1, January 2019
Pages: 1907 - 1914Mahathma Gandhi National Rural Employment Guarantee System
Safad Ismail
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 369 - 374Launching Virtual Machine in OpenNebula and Ensuring Accountability in Cloud Data
Midhu Babu, A. M. J Muthu Kumaran
Similar Articles with Keyword 'logs'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3069 - 3074On the Utilization Aspect of Document Data for Mining the Side Information
N.S. Krishna Prasad, S. Dhana Sekaran
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2366 - 2368A Survey on Effective Quality Enhancement of Text Clustering & Classification Using METADATA
Padmaja Shivane, Rakesh Rajani
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2007 - 2011Approaches for User Image Search-goals with Implicit Guidance of User: A Survey
Apurva S. Gomashe, R. R. Keole
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2173 - 2176Knowledge Retrieval from Web Server Logs Using Web Usage Mining
Naresh Kumar Kar, H. R. Sharma, Asha Ambhaikar
Similar Articles with Keyword 'authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1347 - 1350A QR-Code Authentication for Medical Image Access Environment
Inakollu Ramesh, K. B. V. Rama Narasimham
Similar Articles with Keyword 'audit'
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Similar Articles with Keyword 'security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar