CFP last date
20 May 2024
Reseach Article

An Efficient Approach using AES for Accountability in Cloud

by Rintumol Joseph, Fabeela Ali Rawther, Merlin Mary James
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 3
Year of Publication: 2013
Authors: Rintumol Joseph, Fabeela Ali Rawther, Merlin Mary James
10.5120/13469-0493

Rintumol Joseph, Fabeela Ali Rawther, Merlin Mary James . An Efficient Approach using AES for Accountability in Cloud. International Journal of Computer Applications. 78, 3 ( September 2013), 17-20. DOI=10.5120/13469-0493

@article{ 10.5120/13469-0493,
author = { Rintumol Joseph, Fabeela Ali Rawther, Merlin Mary James },
title = { An Efficient Approach using AES for Accountability in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 3 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number3/13469-0493/ },
doi = { 10.5120/13469-0493 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:39.504137+05:30
%A Rintumol Joseph
%A Fabeela Ali Rawther
%A Merlin Mary James
%T An Efficient Approach using AES for Accountability in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 3
%P 17-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing promises to increase the velocity with which applications are deployed, increase innovation, and lower costs, all while increasing business agility. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. This lead to a situation that the owner may have a fear of loss of data. To avoid this problem the term accountability has been introduced here. Here the owner's data information are stored in the jar file. At the uploading time, one time password concept has been used to give more security to the data. log file access by the owner by either push or pull algorithm is also made much secure with an AES approach. Here we have proposed a novel algorithm for Log push and pull method which is comparatively simple than the existing approaches. In that AES has been is applied. We provide implementation details that describe the efficiency and effectiveness of the proposed approaches.

References
  1. Cloud Computing Basics. Association of information technology professionals.
  2. Ensuring Distributed Accountability for Data Sharing in the Cloud Smitha Sundareswaran, Anna C. Squicciarini, Member, IEEE, and Dan Lin
  3. Distributed Accountability for Data Sharing in Cloud. International Journal of Computer Applications (0975 – 8887) Volume 59– No. 8, December 2012
  4. One Time Password for Multi-Cloud Environment. International Journal of Advanced Research in Computer Science and Software Engineering.
  5. . Cloud Computing Security With Steganography and Cryptography AES Algorithm Technology. World Research Journal of Computer Architecture Volume 1, Issue 1, 2012, pp. -11-15. Available online at http://www. bioinfo. in/contents.
  6. Introduction to Cloud Computing architecture White Paper1st Edition, June 2009
  7. B. Crispo and G. Ruffo, "Reasoning about Accountability within Delegation" Proc. Third Int'l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001. .
  8. Addressing cloud computing security issues Dimitrios Zissis ?, Dimitrios Lekkas Department of Product and Systems Design Engineering, University of the Aegean, Syros 84100, Greece.
  9. http://en. wikipedia. org/wiki/jar file format.
  10. Decentralized Trust Management and Accountability in Federated Systems ,Brent N. Chun Intel Research Berkeley Andy Bavier Princeton University Proceedings of the 37th Hawaii International Conference on System Sciences – 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Accountability jar file concept Log pull and log push method