SlideShare a Scribd company logo
Ensuring Distributed Accountability for Data Sharing
                    in the Cloud


Abstract

Cloud computing enables highly scalable services to be easily consumed over the
Internet on an as-needed basis. A major feature of the cloud services is that users’
data are usually processed remotely in unknown machines that users do not own or
operate. While enjoying the convenience brought by this new emerging
technology, users’ fears of losing control of their own data (particularly, financial
and health data) can become a significant barrier to the wide adoption of cloud
services. To address this problem, in this paper, we propose a novel highly
decentralized information accountability framework to keep track of the actual
usage of the users’ data in the cloud. In particular, we propose an object-centered
approach that enables enclosing our logging mechanism together with users’ data
and policies. We leverage the JAR programmable capabilities to both create a
dynamic and traveling object, and to ensure that any access to users’ data will
trigger authentication and automated logging local to the JARs. To strengthen
user’s control, we also provide distributed auditing mechanisms. We provide
extensive experimental studies that demonstrate the efficiency and effectiveness
of the proposed approaches.
Architecture
Literature Survey


1. Identity-Based Encryption from the Weil Pairing
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen
ciphertext security in the random oracle model assuming a variant of the computational Di_e-
Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on
elliptic curves is an example of such a map. We give precise de_nitions for secure identity based
encryption schemes and give several applications for such systems.



2. An Open Framework for Foundational Proof-Carrying Code


Today’s software systems often use many different computation features and span different
abstraction levels (e.g., user code and runtime-system code). To build foundational certified
systems, it is hard to have a single verification system supporting all computation features. In
this paper we present an open framework for foundational proof-carrying code (FPCC). It allows
program modules to be specified and certified separately using different type systems or program
logics. Certified modules (i.e., code and proof) can be linked together to build fully certified
systems. The framework supports modular verification and proof reuse. It is also expressive
enough so that invariants established in specific verification systems are preserved even when
they are embedded into our framework. Our work presents the first FPCC framework that
systematically supports interoperation between different verification systems. It is fully
mechanized in the Coq proof assistant with machine-checkable soundness proof.



3. Towards a theory of accountability and audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to
enforce authorization policies. In this paper, we describe an operational model of accountability-
based distributed systems. We describe analyses which support both the design of accountability
systems and the validation of auditors for finitary accountability systems. Our study provides
formal foundations to explore the tradeoffs underlying the design of accountability systems
including: the power of the auditor, the efficiency of the audit protocol, the requirements placed
on the agents, and the requirements placed on the communication infrastructure.

Existing System
With respect to Java-based techniques for security, our methods are related to self-defending
objects (SDO) . Self-defending objects are an extension of the object-oriented programming
paradigm, where software objects that offer sensitive functions or hold sensitive data are
responsible for protecting those functions/data. Similarly, we also extend the concepts of object-
oriented programming. The key difference in our implementations is that the authors still rely on
a centralized database to maintain the access records, while the items being protected are held as
separate files. In previous work, we provided a Java-based approach to prevent privacy leakage
from indexing , which could be integrated with the CIA framework proposed in this work since
they build on related architectures. In terms of authentication techniques, Appel and Felten
proposed the Proof-Carrying authentication (PCA) framework.


The PCA includes a high order logic language that allows quantification over predicates, and
focuses on access control for web services. While related to ours to the extent that it helps
maintaining safe, high-performance, mobile code, the PCA’s goal is highly different from our
research, as it focuses on validating code, rather than monitoring content. Another work is by
Mont et al. who proposed an approach for strongly coupling content with access control, using
Identity-Based Encryption (IBE) .




We also leverage IBE techniques, but in a very different way. We do not rely on IBE to bind the
content with the rules. Instead, we use it to provide strong guarantees for the encrypted content
and the log files, such as protection against chosen plaintext and cipher text attacks. In addition,
our work may look similar to works on secure data provenance , but in fact greatly differs from
them in terms of goals, techniques, and application domains. Works on data provenance aim to
guarantee data integrity by securing the data provenance. They ensure that no one can add or
remove entries in the middle of a provenance chain without detection, so that data are correctly
delivered to the receiver. Differently, our work is to provide data accountability, to monitor the
usage of the data and ensure that any access to the data is tracked. Since it is in a distributed
environment, we also log where the data go. However, this is not for verifying data integrity, but
rather for auditing whether data receivers use the data following specified policies.


Proposed System

In the Proposed System, a novel highly decentralized information accountability
framework to keep track of the actual usage of the users’ data in the cloud. In
particular, we propose an object-centered approach that enables enclosing our
logging mechanism together with users’ data and policies. We leverage the JAR
programmable capabilities to both create a dynamic and traveling object, and to
ensure that any access to users’ data will trigger authentication and automated
logging local to the JARs. To strengthen user’s control, we also provide distributed
auditing mechanisms. We provide extensive experimental studies that demonstrate
the efficiency and effectiveness of the proposed approaches with the following
constraints.


1. The logging should be decentralized in order to adapt to the dynamic nature of
the cloud. More specifically, log files should be tightly bounded with the
corresponding data being controlled, and require minimal infrastructural support
from any server.


2. Every access to the user’s data should be correctly and automatically logged.
This requires integrated techniques to authenticate the entity who accesses the data,
verify, and record the actual operations on the data as well as the time that the data
have been accessed.
3. Log files should be reliable and tamper proof to avoid illegal insertion, deletion,
and modification by malicious parties. Recovery mechanisms are also desirable to
restore damaged log files caused by technical problems.


4. Log files should be sent back to their data owners periodically to inform them of
the current usage of their data. More importantly, log files should be retrievable
anytime by their data owners when needed regardless the location where the files
are stored.


5. The proposed technique should not intrusively monitor data recipients’ systems,
nor it should Introduce heavy communication and computation overhead, which
otherwise will hinder its feasibility and adoption in practice.


System Software and Hardware Requirement Specifications

System              : Pentium IV 2.4 GHz or Latest
Hard Disk            : 40 GB
Floppy Drive         : 1.44 Mb
Monitor              : 14’ Colour Monitor
Mouse                : Optical Mouse
Ram                  : 512 Mb
Keyboard             : 101 Keyboard.
Software Requirements
Operating system    : Windows XP
Coding Language     : Java (RMI, Swings, Awt, Networking)
Mobile Coding       : J2ME
Wireless Toll kit    : Sun WTK 2.5.1 Wireless Toolkit
Data Base           : MS Access
IDE                 : Eclipse (Galileo)

More Related Content

PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PDF
Cloud Computing Environment using Secured Access Control Technique
PDF
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
PPTX
Attribute-Based Encryption for Cloud Security
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
Attribute based encryption with privacy preserving in clouds
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
PDF
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Cloud Computing Environment using Secured Access Control Technique
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Attribute-Based Encryption for Cloud Security
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Attribute based encryption with privacy preserving in clouds
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...

What's hot (19)

PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
PDF
Comments on “control cloud data access privilege and anonymity with fully ano...
PDF
Oruta project report
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
PDF
Attribute-Based Data Sharing
PDF
IRJET - Virtual Data Auditing at Overcast Environment
DOC
Oruta privacy preserving public auditing
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
A Novel privacy preserving public auditing for shared data in cloud
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
DOC
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
PDF
Secure Data Storage in Cloud Using Encryption and Steganography
DOCX
Cam cloud assisted privacy preserving mobile health monitoring
PDF
Achieving Secure, sclable and finegrained Cloud computing report
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Comments on “control cloud data access privilege and anonymity with fully ano...
Oruta project report
Oruta privacy preserving public auditing for shared data in the cloud
Scalable and secure sharing of personal health records in cloud computing usi...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
Attribute-Based Data Sharing
IRJET - Virtual Data Auditing at Overcast Environment
Oruta privacy preserving public auditing
Shared authority based privacy preserving authentication protocol in cloud co...
A Novel privacy preserving public auditing for shared data in cloud
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
Decentralized access control with anonymous authentication of data stored in ...
Cloud assisted mobile-access of health data with privacy and auditability
Privacy preserving public auditing for regenerating-code-based cloud storage
Secure Data Storage in Cloud Using Encryption and Steganography
Cam cloud assisted privacy preserving mobile health monitoring
Achieving Secure, sclable and finegrained Cloud computing report
Ad

Viewers also liked (14)

PDF
Security & Biometrics LATAM Report
PDF
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
PDF
Biometric systems
PPTX
Biometrics Pros & cons
DOCX
Biometric Authentication Technology - Report
PDF
Introduction of Biometrics
DOC
Biometric technology
DOCX
Final report
PDF
Final Report Biometrics
DOC
Biometrics Technology Seminar Report.
PPTX
biometrics
PPT
Biometric slideshare
PPTX
Biometrics Technology
PPT
Biometric's final ppt
Security & Biometrics LATAM Report
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
Biometric systems
Biometrics Pros & cons
Biometric Authentication Technology - Report
Introduction of Biometrics
Biometric technology
Final report
Final Report Biometrics
Biometrics Technology Seminar Report.
biometrics
Biometric slideshare
Biometrics Technology
Biometric's final ppt
Ad

Similar to Ensuring distributed accountability (20)

PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
PDF
I42024349
PPTX
PPTX
PPTX
Dont look at this
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
82ugszwcqn29itkwai2q 140424034504-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
I42024349
Dont look at this
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01

Ensuring distributed accountability

  • 1. Ensuring Distributed Accountability for Data Sharing in the Cloud Abstract Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this paper, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users’ data will trigger authentication and automated logging local to the JARs. To strengthen user’s control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.
  • 3. Literature Survey 1. Identity-Based Encryption from the Weil Pairing We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Di_e- Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise de_nitions for secure identity based encryption schemes and give several applications for such systems. 2. An Open Framework for Foundational Proof-Carrying Code Today’s software systems often use many different computation features and span different abstraction levels (e.g., user code and runtime-system code). To build foundational certified systems, it is hard to have a single verification system supporting all computation features. In this paper we present an open framework for foundational proof-carrying code (FPCC). It allows program modules to be specified and certified separately using different type systems or program logics. Certified modules (i.e., code and proof) can be linked together to build fully certified systems. The framework supports modular verification and proof reuse. It is also expressive enough so that invariants established in specific verification systems are preserved even when they are embedded into our framework. Our work presents the first FPCC framework that systematically supports interoperation between different verification systems. It is fully mechanized in the Coq proof assistant with machine-checkable soundness proof. 3. Towards a theory of accountability and audit Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of accountability- based distributed systems. We describe analyses which support both the design of accountability systems and the validation of auditors for finitary accountability systems. Our study provides
  • 4. formal foundations to explore the tradeoffs underlying the design of accountability systems including: the power of the auditor, the efficiency of the audit protocol, the requirements placed on the agents, and the requirements placed on the communication infrastructure. Existing System With respect to Java-based techniques for security, our methods are related to self-defending objects (SDO) . Self-defending objects are an extension of the object-oriented programming paradigm, where software objects that offer sensitive functions or hold sensitive data are responsible for protecting those functions/data. Similarly, we also extend the concepts of object- oriented programming. The key difference in our implementations is that the authors still rely on a centralized database to maintain the access records, while the items being protected are held as separate files. In previous work, we provided a Java-based approach to prevent privacy leakage from indexing , which could be integrated with the CIA framework proposed in this work since they build on related architectures. In terms of authentication techniques, Appel and Felten proposed the Proof-Carrying authentication (PCA) framework. The PCA includes a high order logic language that allows quantification over predicates, and focuses on access control for web services. While related to ours to the extent that it helps maintaining safe, high-performance, mobile code, the PCA’s goal is highly different from our research, as it focuses on validating code, rather than monitoring content. Another work is by Mont et al. who proposed an approach for strongly coupling content with access control, using Identity-Based Encryption (IBE) . We also leverage IBE techniques, but in a very different way. We do not rely on IBE to bind the content with the rules. Instead, we use it to provide strong guarantees for the encrypted content and the log files, such as protection against chosen plaintext and cipher text attacks. In addition, our work may look similar to works on secure data provenance , but in fact greatly differs from them in terms of goals, techniques, and application domains. Works on data provenance aim to guarantee data integrity by securing the data provenance. They ensure that no one can add or remove entries in the middle of a provenance chain without detection, so that data are correctly delivered to the receiver. Differently, our work is to provide data accountability, to monitor the
  • 5. usage of the data and ensure that any access to the data is tracked. Since it is in a distributed environment, we also log where the data go. However, this is not for verifying data integrity, but rather for auditing whether data receivers use the data following specified policies. Proposed System In the Proposed System, a novel highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users’ data will trigger authentication and automated logging local to the JARs. To strengthen user’s control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches with the following constraints. 1. The logging should be decentralized in order to adapt to the dynamic nature of the cloud. More specifically, log files should be tightly bounded with the corresponding data being controlled, and require minimal infrastructural support from any server. 2. Every access to the user’s data should be correctly and automatically logged. This requires integrated techniques to authenticate the entity who accesses the data, verify, and record the actual operations on the data as well as the time that the data have been accessed.
  • 6. 3. Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and modification by malicious parties. Recovery mechanisms are also desirable to restore damaged log files caused by technical problems. 4. Log files should be sent back to their data owners periodically to inform them of the current usage of their data. More importantly, log files should be retrievable anytime by their data owners when needed regardless the location where the files are stored. 5. The proposed technique should not intrusively monitor data recipients’ systems, nor it should Introduce heavy communication and computation overhead, which otherwise will hinder its feasibility and adoption in practice. System Software and Hardware Requirement Specifications System : Pentium IV 2.4 GHz or Latest Hard Disk : 40 GB Floppy Drive : 1.44 Mb Monitor : 14’ Colour Monitor Mouse : Optical Mouse Ram : 512 Mb Keyboard : 101 Keyboard.
  • 7. Software Requirements Operating system : Windows XP Coding Language : Java (RMI, Swings, Awt, Networking) Mobile Coding : J2ME Wireless Toll kit : Sun WTK 2.5.1 Wireless Toolkit Data Base : MS Access IDE : Eclipse (Galileo)