IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Data Traceability and Privacy Preserving and Accountability for Data Sharing in the Cloud Suravarapu Anusha, Seelam Sai Satyanarayana Reddy 1

PG Scholar, Computer Science And Engineering, Lakkireddy Balireddy College Of Engineering Mylavaram, Andhra pradesh, India [email protected]

2

Prefessor , Computer Science And Engineering, Lakkireddy Balireddy College Of Engineering Mylavaram, Andhra Pradesh, India [email protected]

Abstract Privacy protection techniques of cloud focusing on controlling the cloud environment, that’s why research is needed in the area of accountability and auditing. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. In addition, we propose a method based on probabilistic query and periodic verification for improving the performance of audit services. Our experimental results not only validate the effectiveness of our approaches, but also show our audit system verifies the integrity with lower computation overhead and requiring less extra storage for audit metadata. An object-centered approach is proposed so that it facilitates by including our logging method together with users’ data and policies. To ensure that any access to users’ data will trigger validation and automatic logging local to the java archives (JARs) and we persuade the JAR programmable abilities to both create a dynamic and traveling object. We also provide distributed auditing methods to reinforce user’s control .

keywords: Data Storage ,Cloud Computing, Data Ttraceability , Integrity, Trigger Validation.

Suravarapu Anusha,IJRIT

173

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

1. INTRODUCTION In cloud computing we can share our data and application in common center. It is a technology which uses internet and share resources to maintain data. Security is important issue because cloud having many benefits so, it have many users. For security purpose this paper providing ICIA framework The Improve Cloud Information Accountability framework given in this work performs automatic login and auditing. Using this mechanism data owner get updates that his data is safe on cloud. This auditing is carried out at any time at any CSP. It has two major components: logger and log harmonizer. Logger is a JAR file with user's data as data access it creates log record of each data access. The JAR file contains set of access control rules specifying who(company and users),where and when will use data. Apart from that going to check the integrity of the JRE on the systems on which the logger components is initiated. This integrity checks are carried out by using oblivious hashing. Depending on the configuration policies defined at the time of creation, the JAR will provide usage control policies with data owner's data. During each time access of data, Jar will automatically create log record. In this ICIA framework data owner will send his data to cloud service provider with data and access control policies in encrypted form with keys(private and public key),whenuser will use data, he will decrypt data using public key, and when he will use particular data then jar will automatically create corresponding log records using logger component, logger will send log records to log harmonizer. Then log harmonizer will push this records to data owner so owner can see logs when he wants, he get confirmation that his data is handled according to service level agreement and his data is safe on cloud using this framework.

1. Cloud context diagram Suravarapu Anusha,IJRIT

174

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

2. RELATED WORK In this section we first review related works addressing security in cloud. Security issue is very important in cloud there are many techniques available so here is review of all these. Q. Wang et al describes Third party auditor for verification, they describes three network entities i.e. client which is user, cloud storage server which is handled by cloud service provider and Third party auditor which is verifier.TPA having public key, it is act with only trusted server, they are not focuses on data privacy .In the author presents effective usage control model for security of kernel integrity. UCONKI model with properties of continue the decision for OS kernel integrity protection, they proposes virtual machine monitor (VMM) based architecture for preventing attacks inside virtual machine . Ryan K L Ko et al in their paper presents accountability for cloud computing, accountability is verification of access control policies. In author presents author presents three layer architecture for preventing information leakage from indexing in cloud . R. corin et al in their paper presents language in which data owner will send data and policies to agent, responsibility of agent to check all authentication and authorization policies of users and action of users. but there is problem of Continuous monitoring of agent.Jia Xu et al in their paper gives the proofs of retrievability i.e. POR model to ensure security of data storage in cloud. This is cryptographic function for remotely auditing purpose. Examples of sample policies are: 1.) Personal data of a user cannot be taken outside the resident country of the user by any services. Such breach, access to the data would be revoked. Using my traceability model, it is possible to trace the history of data to find the physical location from the virtual location of the user’s personal data, and the service that copied and stored it to a location. The original and copy should have the same location footprint, otherwise a violation has occurred . 2.) Any non-provisioned Telco services can access user’s personal data, but cannot allow access or share of these data to any 3rd party services that the user is not aware of. 3.)The traceable data are required to check for which Telco services are using the user’s personal data. Then we can identify if any of these services are exposing data to 3rd parties. This can be in the form of APIs, or direct. Third party auditor: The data owners having large amount of outsourced data and the task of auditing the data correctness in a cloud environment can be difficult and expensive for data owners. So, the communication between the data owners and cloud servers through third party auditing. Third party auditing provides a transparent yet costeffective method for establishing trust between data owner and cloud server. In order to save the time, computation resources, and even the related online burden of users, we also provide the extension of the proposed main scheme to support third-party auditing, where users can safely delegate the integrity checking tasks to third-party auditors (TPA) and be worry-free to use the cloud storage services.

Suravarapu Anusha,IJRIT

175

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

2. Data auditing technique

3. Overview of Accountability Mechanisms Accountability mechanisms are proposed to deal with privacy concerns of end users and then develop a privacy manager. The processing is done on the encrypted data as the user’s confidential data are sent to the cloud in an encrypted form . To disclose the correct result the output of the processing is deobfuscated by the privacy manager.However, the confidentiality manager provides only incomplete features in that it does not assurance security once the data are being disclosed. A layered architecture is presented for addressing the end-to-end trust management and responsibility problem in associated systems. Researchers have examined responsibility mostly as a demonstrable property through cryptographic mechanisms . The usages of procedures attached to the data are proposed and present logic for responsibility data in disseminated settings. Similarly, logic for designing accountability-based distributed systems is proposed. In this paper, an interesting approach related to accountability in case of delegation is proposed. This paper is a development of our earlier convention paper. We have made the following new assistance. First, in order to strengthen the reliability of our system in case of compromised JRE we integrated reliability checks and oblivious hashing (OH) technique to our system. To provide added guarantees of reliability and validity we updated the log report structures. Second, to cover more probable attack situations we extended the safety analysis. Third, we give a comprehensive evaluation of the system performance by reporting the results of new experiments. Fourth, to prepare readers with an improved understanding of background knowledge we have added a comprehensive discussion on related works. Logging Mechanism:The encryption of the log file avoids the unauthorized change to the file by attackers. The log harmonizer is to hold the log file corruption and the logger send the error correction information in to the log harmonizer. To guarantee trustworthiness of the logs, every record is signed by the entity accessing the content. After that the entity records should be hashed together and to generate the chain structure, so it can easily detect the errors and missing records. To verify the integrity, the encrypted log files can be converted in to the decrypted form. Every log harmonizer is in charge of copies of the logger components contains the similar set of data items. Suravarapu Anusha,IJRIT

176

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

3. logging mechanism.

4. Abstract Verification Model For Cloud Computing In this section we describe an evolving model that responds to the issues raised in the above sections. Since our research is not yet complete, we do not posit this as a complete and final model, but rather an abstract proposal that paves the way to develop more constructive models that resolve the raised issues. There has not been much research work done in this direction and according to the best of our knowledge, no general approach exists which proposes any formal verification method(s) covering cloud systems in general. Few verification models in this area exist, for instance, Jaraya et al. recently published about security verification in elastic cloud computing platforms using cloud calculus (which they define in their paper). More specifically, the authors present a framework for virtual machine migration and security policy updates using their cloud calculus. This approach however does not give a general verification model for complete cloud systems including cloud service providers and cloud service users. Another very useful (partial) system verification is presented in , where verification of the data location is proposed based on network coordinate systems. Even if the cloud operator uses supplemental measures like traffic relaying to hide the resource location, the authors claim that a high probability of location disclosure is achieved by the means of supervised classification algorithms. Shraer et al. present a service that verifies the usage of cloud storage but this service also does not ensure the complete verification of a cloud application, e.g., of service contracts, integration and resource provisioning. A more recent and closely related work by Bouchenak et al. also highlights many different needs for verification of non-functional requirements in cloud computing. They discuss the state of the art in these areas and identified gaps and challenges, which explain the lack of sufficient tools for monitoring and evaluation of cloud services. Their article explains different verification of different cloud service properties Suravarapu Anusha,IJRIT

177

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

with reference to related existing work and future challenges with a conclusion that only heuristics based approaches are not enough to guarantee quality-of-service(QoS).

5. DATA TRACEABILTY TECHNIQUE To increase the trust of the users of the operator, an interactive dashboard that lists all the cloud services subscribed by the users. It provides a trace of how their data were generated, used, stored, used and shared by subscribed and unsubscribed services. More importantly, users are able to write policies that can trace which other services using their data, and reserves the right to grant and revoke access. This also applied to the anonymized, aggregated data.The traceable model is able to differentiate between different types of calls. policy three - After de-provision of a service, all the associated data must be deleted completely. In such breach, any access to personal data will be denied. EU legislation ‘right to be forgotten’

require all the data associated with a user must be deleted

permanently. Using our traceable model, the historical data can be used to prove the process of deletion and check of any existence of any data after deletion. Failure to complycan result in a hefty fine. In the cloud, data may be

Suravarapu Anusha,IJRIT

178

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

transmitted from various sourcessuch as a PC, laptop, mobile and other devices. Data residing outside the cloud is referred to as a physical resource as opposed to in the cloud. In order to necessitate the transfer of the data to the cloud, it is essential to virtualize the data with necessary redundancies for optimal availability, and scalability. Data within the cloud can be shared, modified or deleted by one or more participants, services or agents.

4. Cprov model. The model provides a representation of provenance history using Prov notation , consisting of nodes (vertices) and relationship (edges). Node represents the building blocks of a service. There are five new derived nodes (cprov:Transition, cprov:cProcess, cprov:Resource, cprov:pResource and cprov:cResource). The ellipsis are subtypes of prov:Entity, and rectangles are subtypes of prov:Activity.

6. Conclusion The main focus of this paper is to present a comparison of verification requirements of cloud and distributed systems at different levels, i.e., based on their business, architecture, programming and security models and privacy management and jar programming capabilities.

7. References [1] J. Voas and J. Zhang, “Cloud computing: New wine or just a new bottle?” IT professional, vol. 11, no. 2 Suravarapu Anusha,IJRIT

179

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 173-180

[2] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,” Proc. [3] C. S. Holling, “Understanding the Complexity of Economic, Ecological, and Social Systems,” Ecosystems, vol. 4, no. 5, pp. 390–405, [10] W. Voorsluys, J. Broberg, and R. Buyya, Introduction to Cloud Computing. John Wiley & Sons, Inc., 2011, pp. 1–41. [4]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598-609 . [5] P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11,pp. 205-225,

Suravarapu Anusha,IJRIT

180

Data Traceability and Privacy Preserving and Accountability for Data ...

verification, they describes three network entities i.e. client which is user, cloud storage server which is handled by cloud service provider and Third party auditor which is verifier.TPA having public key, it is act with only trusted server, they are not focuses on data privacy .In the author presents effective usage control model ...

2MB Sizes 0 Downloads 269 Views

Recommend Documents

Data Traceability and Privacy Preserving and ...
1PG Scholar, Computer Science And Engineering, Lakkireddy Balireddy College ... since services in Cloud Computing are not limited to archive or backup data only. ... Using my traceability model, it is possible to trace the history of data to find.

Privacy Preserving and Scalable Processing of Data ...
tremendously in accordance with the Big Data trend, thereby making it a challenge for commonly-used software tools to capture, manage and process such large ... most important research topics in data security field and it have become a serious concer

Privacy Preserving and Scalable Processing of Data ...
tremendously in accordance with the Big Data trend, thereby making it a ... Cloud computing is a model for enabling convenient, on-demand network access to a .... We briefly review recent research on data privacy preservation and privacy ...

Privacy-Preserving Incremental Data Dissemination
In this paper, we consider incremental data dissemination, where a ..... In other words, the data provider must make sure that not only each ...... the best quality datasets, these data are vulnerable to inference attacks as previously shown.

Slicing: A New Approach for Privacy Preserving Data ...
Computer Science at Purdue University, West Lafayette, IN 47906. E-mail: {li83, ninghui ..... be an original tuple, the matching degree between t and B is the product of ...... online privacy protection, privacy-preserving data publishing, and oper-.

Oruta Privacy-Preserving Public Auditing for Shared Data in the ...
Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud.pdf. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud.pdf. Open.

Implementing Security to information using privacy preserving data ...
Abstract: Rapidly growing use and development of data mining technologies bring serious issues to the security of individual's vital and sensitive information. An emerging research topic in data mining, known as privacy- preserving data mining (PPDM)

KAPDA: k-Anonymous Privacy-preserving Data ...
Wireless Sensor Networks, Privacy Preserving Data Aggre- gation, k-Anonymity ... This incurs a high overhead and does not preserve data ..... 16 bits and runs at a speed of 4 MHz. To determine ..... Routing for Anonymous and Private Internet.

Scalable Privacy-Preserving Data Mining with ...
Abstract. In the Naıve Bayes classification problem using a vertically partitioned dataset, the conventional scheme to preserve privacy of each partition uses a secure scalar product and is based on the assumption that the data is synchronised among

Privacy-Preserving Protocols for Perceptron ... - Semantic Scholar
the case of client-server environment, and it is assumed that the neural ... Section 4 is dedicated ... preserving protocol neural network for client-server environ-.

Privacy-Preserving Protocols for Perceptron ... - Semantic Scholar
School of Information Technology and. Engineering (SITE). University ... to the best of our knowledge, there is no privacy-preserving technique to collaboratively ...

Gmatch Secure and Privacy-Preserving Group Matching in Social ...
Each group member generate his pub- lic/private key pair (pki. , ski) for computing ring signatures. The ring signature scheme we used is BGLS [4], which is.

cloud-computing-in-ghana.-data-privacy-regulatory-framework-and ...
There was a problem loading more pages. cloud-computing-in-ghana.-data-privacy-regulatory-framework-and-opportunities.pdf. cloud-computing-in-ghana.

OASD Data Use and Privacy Practices.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. OASD Data Use ...