Review on auditing cloud consistency service

  • Authors

    • Shaik BajiVali
    • M N V V K Pavan Kumar
    2017-12-31
    https://doi.org/10.14419/ijet.v7i1.5.9143
  • Abstract

    An increasing sort of groups or migrating their critical data era offerings, from tending to business intelligence, into public cloud computing environments. but, but cloud technologies or unendingly evolving, they nevertheless have not reached a maturity stage that allows them to offer users with high guarantee concerning the security in their info on the way facet existent provider level agreements. to influence this limitation, we've were given a unethical to propose a fixed of mechanisms that enhances cloud computing technology with more warranty skills. assurance will become a measurable assets, quantified by means of the quantity of proof to audit and retain at some stage in a privateness-maintaining and non-respectable fashion. by way of proactively grouping potential rhetorical proof, the cloud turns into extra accountable, while presenting its regular offerings. the various case of a security breach, the cloud provides the perfect reactive security framework for corroborative or repudiating claims. moreover, totally completely distinct levels of warranty relate to one-of-a-kind degrees of storage and privateness protection requested by means of customers, main to companion warranty-based price version for cloud services.

  • References

    1. [1] James P. Anderson, Computer security threat monitoring and surveillance, Technical Report, Fort Washington, PA, 1980.

      [2] Stefan Axelsson, Intrusion detection systems: A survey and taxonomy, Technical Report 99-15, Chalmers University of Technology Department of Computer Engineering, March 2000.

      [3] Adam Barth, Design and analysis of privacy policies, Ph.D. Thesis, Stanford University, 2008.

      [4] R. Dingledine, N. Mathewson, and P. Syverson, Tor: The secondgeneration onion router, 13th Conference on USENIX Security Symposium, 2004.

      [5] George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza Basrai, and Peter M. Chen, ReVirt: Enabling intrusion analysis through virtualmachine logging and replay, Symposium on Operating Systems Design and Implementation, 2002.

      [6] Regional Computer Forensics Laboratory Program, Annual Report for Fiscal Year 2011, http://www.rcfl.gov/downloads/ documents/RCFL Nat Annual11.pdf

      [7] Chapman Flack and Mikhail J. Atallah, Better logging through formality: Applying formal specification techniques to improve audit logs and log consumers, Recent Advances in Intrusion Detection, 2000.

      [8] Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer, A secure environment for untrusted helper applications, 6th Usenix Security Symposium, 1996.

      [9] Andreas Haeberlen, Petr Kouznetsov, and Peter Druschel, PeerReview: Practical accountability for distributed systems, 21st ACM Symposium on Operating Systems Principles, 2007.

      [10] Andreas Haeberlen, A Case for the Accountable Cloud, 3rd ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware, 2009.

      [11] R. Hagmann, Reimplementing the Cedar file system using logging and group commit, 11th ACM Symposium on Operating Systems Principles, 1987.

      [12] http://www.cms.hhs.gov/SecurityStandard

      [13] Kapil Jain and R. Sekar, User-level infrastructure for system call interposition: A platform for intrusion detection and confinement, ISOC Network and Distributed Systems Symposium, 2000.

      [14] Renico Koen, The development of an open-source forensics platform, M.Sc. Thesis, University of Pretoria, 2009.

      [15] Raffael Marty, Cloud application logging for forensics, ACM Symposium on Applied Computing, 2011.

      [16] NILFS, http://www.nilfs.org/en/

      [17] Rafail Ostrovsky, Amit Sahai, and Brent Waters, Attribute-based encryption with non-monotonic access structures, 14th ACM Conference on Computer and Communications Security, 2007.

      [18] V. Prasad, W. Cohen, F. C. Eigler, M. Hunt, J. Keniston, and B. Chen, Locating system problems using dynamic instrumentation, Ottawa Linux Symposium, 2005.

      [19] Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu, OpenDHT: A public DHT service and its uses, ACM SIGCOMM, 2005.

      [20] Muriel Roger and Jean Goubault-Larrecq, Log auditing through model checking, 14th IEEE Computer Security Foundations Workshop, 2001.

      [21] Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie, Cloud forensics: an overview, Advances in Digital Forensics, Vol. 7, 2011.

      [22] Bruce Schneier and John Kelsey, Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, 2(2), pp. 159-176, May 1999.

      [23] W. Olin Sibert, Auditing in a distributed system: Secure SunOS audit trails, 11th National Computer Security Conference, 1988.

      [24] Rajesh, M., and J. M. Gnanasekar. "Congestion Control Using AODV Protocol Scheme For Wireless AD-HOC Network." Advances in Computer Science and Engineering 16.1/2 (2016): 19.

      [25] S.V.Manikanthan and V.Rama“Optimal Performance Of Key Predistribution Protocol In Wireless Sensor Networks†International Innovative Research Journal of Engineering and Technology ,ISSN NO: 2456-1983,Vol-2,Issue –Special –March 2017.

      [26] T. Padmapriya, V.Saminadan, “Performance Improvement in long term Evolution-advanced network using multiple imput multiple output techniqueâ€, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, Sp-6, pp: 990-1010, 2017.

  • Downloads

  • How to Cite

    BajiVali, S., & Kumar, M. N. V. V. K. P. (2017). Review on auditing cloud consistency service. International Journal of Engineering & Technology, 7(1.5), 180-184. https://doi.org/10.14419/ijet.v7i1.5.9143

    Received date: 2018-01-11

    Accepted date: 2018-01-11

    Published date: 2017-12-31