Cloud Computing: A Responsibility data sharing in the cloud computing

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2013 by IJPTT Journal
Volume-3 Issue-4                           
Year of Publication : 2013
Authors : K.Phanindhar, Ch.Suresh


K.Phanindhar, Ch.Suresh."Cloud Computing: A Responsibility data sharing in the cloud computing". International Journal of P2P Network Trends and Technology (IJPTT), V3(4):11 - 16  Jul - Aug 2013, ISSN:2249-2615, Published by Seventh Sense Research Group.


— Cloud computing provides highly efficient services to be easily accessed or used over the Internet on as needed basis. An important feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. This convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this paper, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object centred approach that enables enclosing our logging mechanism together with users’ data and policies. We leverage the JAR programmable capabilities to both create a dynamic and travelling object, and to ensure that any access to users’ data will trigger authentication and automated logging local to the JARs. To strengthen user’s control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.


[1] Y. Chen et al., “Oblivious Hashing: A Stealthy Software Integrity Verification Primitive,” Proc. Int’l Workshop Information Hiding, F. Petitcolas, ed., pp. 400-414, 2003.
[2] S. Etalle and W.H. Winsborough, “A Posteriori Compliance Control,” SACMAT ’07: Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 11-20, 2007.
[3] X. Feng, Z. Ni, Z. Shao, and Y. Guo, “An Open Framework for Foundational Proof-Carrying Code,” Proc. ACM SIGPLAN Int’l Workshop Types in Languages Design and Implementation, pp. 67-78, 2007.
[4] Flickr,, 2012.
[5] R. Hasan, R. Sion, and M. Winslett, “The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance,” Proc. Seventh Conf. File and Storage Technologies, pp. 1-14, 2009.


- Cloud computing, accountability, data sharing.