Preview

Ensuring Disturbted Accountability in Data Sharing

Good Essays
Open Document
Open Document
300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ensuring Disturbted Accountability in Data Sharing
ABSTRACT

Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this project, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. Our proposed CIA framework provides end-toend accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed. Associated with the accountability feature, We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users' data will trigger authentication and automated logging local to the JARs. To strengthen user's control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis.

Project Members: Project Guide:

You May Also Find These Documents Helpful

  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    The ability for organizations to control and customize security features in cloud-based productivity services, such as email, calendars, content management, collaboration, and unified communications, is becoming an essential requirement for virtually every company. Today, IT teams are being required to deliver access to productivity services and associated documents and data from more devices, platforms, and places than ever before. While user benefits are undeniable, broader access makes security management more challenging. Each endpoint represents a potential attack surface and another point of…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Computing

    • 1763 Words
    • 7 Pages

    IT departments and infrastructure providers are under increasing pressure to provide computing infrastructure at the lowest possible cost. In order to do this, the concepts of resource pooling, virtualization, dynamic provisioning, utility and commodity computing must be leveraged to create a public or private cloud that meets these needs. Cloud computing is a general term for anything that involves delivering hosted services over the Internet. This provides the smaller companies or individuals who couldn’t able to buy costly software or any other resources. This becomes easy because of cloud computing. Cloud promises real costs savings and agility to customers. It’s a ‘Pay for Usage’ plan. We pay the money based on our usage only. Through cloud computing, a company can rapidly deploy applications where the underlying technology components. Access to applications and data anywhere, any Time, from any device is the potential outcome of cloud computing. This is suitable technology for limited budgets and a highly dynamic market with minimal resources.…

    • 1763 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail and word processing. Others are new applications that never existed as a local application, such as online maps and social networks. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned data centers. This shift is intended to reduce the total investment by the federal government in information technology (IT) (data centers), as well as realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security. In December 2010, the U.S. Chief Information Officer (CIO) released “A 25-Point Implementation Plan to Reform Federal IT Management” as part of a comprehensive effort to increase the operational efficiency of federal technology assets. One element of the 25-Point Plan is for agencies to shift to a “Cloud First” policy, which is being implemented through the Federal Cloud Computing Strategy. The Cloud First policy means that federal agencies must (1) implement cloud-based solutions whenever a secure, reliable, and cost-effective cloud option…

    • 13907 Words
    • 56 Pages
    Powerful Essays
  • Good Essays

    Week 3 Case Study CIS 500

    • 711 Words
    • 3 Pages

    Strader, whom is the CIO at Volvo, created vehicles that are data rich it environments given that consumers today highly value smart tech as much as automotive engineering. Volvo Car Corporation is one of the car industry’s most well-known brands. Volvo brand focuses on passengers and drivers; for the fact that the company strive to develop some of the safest cars on the road.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Many types of cloud storage systems have been created to support both personal and professional purposes. In the case of personal use, the basic form of cloud storage allows individuals to upload files or folders of documents or photos from their personal computers to a central Internet server. The advantages of cloud storage for individuals are making backup copies of files in case their originals are lost, downloading the files to other devices and sharing files remotely through the internet. Cloud storage has the unique competence that allows users to access their data from anywhere on any devices. Furthermore, the majority of cloud storage providers offer the syncing ability that allows users to have the same data in multiple places and at the same time store those data up in the cloud.…

    • 3413 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Accountability Formation

    • 531 Words
    • 3 Pages

    The dictionary states that the meaning of the word accountability is “the state of being accountable, liable, or answerable”. This means to me that if I don’t hold accountability for all my gear than I am not doing my duty as a soldier. Holding accountability for my gear is important for many different reasons in fact. For one if anything were to happen to my gear I am held sole responsible for it. Also if it is stolen or ruined for my lack of accountability and due to my actions the company is held back from doing their duties or even I completing mine, I would also be the one held accountable for the hold back. If the gear was stolen I would need to pay for it and it wouldn’t be anyone else’s fault except my own, even if it were simply damaged I would need to replace and/or fix as swiftly as possible to complete my duties so that I am not the one holding back others. Specially with it coming so close to leaving on a mission it is crucial that I hold exceptional accountability for my gear for I would not want to be the sole reason for a glitch in the mission before even leaving, with everyone working so hard to get ready to leave and to have everything in working condition in order for the mission to hopefully go off without a hitch. Being accountable for my gear is to be dependable. Being dependable in keeping track of all my gear so that I am ready for anything that would be needed of me at any time, rather it’s from my country, my superiors, or my fellow soldiers. It is also crucial for me to hold accountability for my gear being a specialist I am setting an example for other soldiers below me and for me not to hold that accountability it doesn’t make me look like a very good role model to look upon in time of need, for any reason. Showing accountability is also a duty for me as a soldier to keep track of all of my gear. If my equipment was taken they could of tampered with the gear and then given it back with me not…

    • 531 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Good Essays

    Accountability is a situation in which people who exercise authority are controlled by external means and internal norms Medical ethics the amount to which a person is accountable to a superior authority. (1) A condition in which individuals who exercise power are constrained by external means and internal norms. (2) Taking responsibility for one’s own actions and defending them to anyone who asks (McGraw-Hill, 2002).…

    • 463 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).…

    • 6658 Words
    • 27 Pages
    Powerful Essays