An Enhanced Distributed Accountability for Data Sharing in the Cloud Computing Technologies
-
https://doi.org/10.14419/ijet.v7i1.8.22961 -
Abstract
In the fast growing world the cloud services benefit the humankind in several ways to ease the processing of a distance computers to communicate and storage. Having several advantages there are few chances of losing control their individual data became tuff job to the cloud service providers. To alleviate this, in this paper there is implementation of data accountability scheme that regularly track the data in the cloud of every user with the help of JAR file system for providing user authenticity. However every user can upload their individual data to cloud and can obtain one account on their own which supports the encrypted format and when the user requires his/her data.
-
References
[1] H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, “An smdp-based service model for interdomain resource allocation in mobile cloud networks,†IEEE Transactions on Vehicular Technology, vol. 61, no. 5, pp. 2222–2232, 2012.
[2] M. M. Mahmoud and X. Shen, “A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks,†IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1805–1818, 2012.
[3] Q. Shen, X. Liang, X. Shen, X. Lin, and H. Luo, “Exploiting geo-distributed clouds for e-health monitoring system with minimum service delay and privacy preservation,†IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, pp. 430–439, 2014.
[4] T. Jung, X. Mao, X. Li, S.-J. Tang, W. Gong, and L. Zhang, “Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation,†in Proceedings of INFOCOM. IEEE, 2013, pp. 2634–2642.
[5] Y. Yang, H. Li, W. Liu, H. Yang, and M. Wen, “Secure dynamic searchable symmetric encryption with constant document update cost,†in Proceedings of GLOBCOM. IEEE, 2014, to appear.
[6] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,†IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014.
[7] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,†in Proceedings of S&P. IEEE, 2000, pp. 44–55.
[8] R. Li, Z. Xu, W. Kang, K. C. Yow, and C.-Z. Xu, “Efficient multi-keyword ranked query over encrypted data cloud computing,†Future Generation Computer Systems, vol. 30, pp. 179– 190, 2014.
[9] H. Li, D. Liu, Y. Dai, T. H. Luan, and X. Shen, “Enabling efficient multi-keyword ranked search over encrypted cloud data through blind storage,†IEEE Transactions on Emerging Topics in Computing, 2014, DOI10.1109/TETC.2014.2371239.
[10] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,†in Proceedings of ICDCS. IEEE, 2010, pp. 253–262.
[11] M.Sheshikala, Mohd Sallauddin, "Survey on Multi Level Security for IoT Network in†in Journal of Advanced Research in Dynamical and Cont, Volume 10, Issue 10, Page No(s) 134 - 146, JUL. 2018, [ISSN (Print): 1943-023X]
[12] K.Sudheer Kumar, Y.Nagender, "Liability for Information sharing in Cloud" in International Journal on Computer Science and Engi, Volume 9, Issue 11, Page No(s) 630 - 634, NOV. 2017, [ISSN (Print):0975-3397]
[13] Y. Chanti, Y.Nagender, B. Vijay Kumar, "QUICKLY NEAREST NEIGHBOR SEARCH TRADITIONAL SPATIAL QUERY WITH KEYWORDS" in International Journal on Computer Science and Engineering (IJCSE), Volume 9, Issue 11, Page No(s) 635 - 638, NOV. 2017, [ISSN (Print):2229-5631, ISSN (Online): 0975-3397]
[14] M Likhitha, S Vahini, “Independent Access to Encrypted Cloud Databases†in International Journal for Technological Research in Engineering (IJTRE), Volume 3, Issue 4, Page No(s) 629-632, DEC 2015. ISSN (Online): 2347 - 4718.313.
-
Downloads
-
How to Cite
Kumar, K. S., Chythanya, K. R., Kumar, N. V., & Siruvoru, V. (2018). An Enhanced Distributed Accountability for Data Sharing in the Cloud Computing Technologies. International Journal of Engineering & Technology, 7(1.8), 233-235. https://doi.org/10.14419/ijet.v7i1.8.22961Received date: 2018-12-02
Accepted date: 2018-12-02