Achieving Secure cloud Data Sharing

  • Published on
    03-Jun-2018

  • View
    215

  • Download
    0

Embed Size (px)

Transcript

<ul><li><p>8/12/2019 Achieving Secure cloud Data Sharing</p><p> 1/9</p><p>I nternational Jour nal of Computer Science Trends &amp; Technology - Volume1 I ssue1, Jul -Aug 2013</p><p>ISSN: 2347-8578 http://www.ijcstjournal.org/ Page 28</p><p>Achieving Secure cloud Data SharingA.SUMANGALI T.V.SAMPATH KUMAR</p><p>M.TECH IN C.S.E, AVSCET ASSOC. PROF IN CSE,AVSCET</p><p>VENKATACHALAM, NELLORE (Dt), A.P. VENKATACHALAM , NELLORE (Dt), A.P.</p><p>a.sumangali@gmail.com tanjavuru.sampath@gmail.com</p><p>AbstractCloud computing enables highly scalableservices to be easily consumed over the Internet on</p><p>an as-needed basis. A major feature of the cloud</p><p>services is that users data are usually processedremotely in unknown machines that users do not</p><p>own or operate. While enjoying the conveniencebrought by this new emerging technology, users</p><p>fears of losing control of their own data (particularly,</p><p>financial and health data)can become a significant</p><p>barrier to the wide adoption of cloud services. To</p><p>address this problem, in this paper, we propose a</p><p>novel highly decentralized informationaccountability framework to keep track of the</p><p>actual usage of the users data in the cloud.</p><p>In particular, we propose an object-centeredapproach that enables enclosing our logging</p><p>mechanism together with users data and policies.</p><p>We leverage the JARprogrammable capabilities to</p><p>both create a dynamic and traveling object, and to</p><p>ensure that any access to users data will triggerauthentication and automated logging local to the</p><p>JARs. To strengthen users control, we also provide</p><p>distributed auditing mechanisms. We provide</p><p>extensive experimental studies that demonstratethe efficiency and effectiveness of the proposed</p><p>approaches.</p><p>Keywords Cloud computing, accountability, data</p><p>sharing.</p><p>I. INTRODUCTION</p><p>LOUD computing presents a new way to</p><p>supplement the current consumption and</p><p>delivery model for IT services based on the</p><p>Internet, by providing for dynamically scalableand often virtualized resources as aservice over</p><p>the Internet. To date, there are a number of</p><p>notable commercial and individual cloud</p><p>computing services, including Ama- zon,</p><p>Google, Microsoft, Yahoo, and Salesforce.</p><p>Details of the servicesprovided are abstracted</p><p>from the users who no longer need to be</p><p>experts of technology infrastructure. Moreover,</p><p>users may not know the machines which</p><p>actually process and host their data. While</p><p>enjoying the convenience brought by this new</p><p>technology, users also start worrying about</p><p>losing control of their own data. The data</p><p>processed on clouds are often outsourced,</p><p>leading to a number of issues related to</p><p>accountability, including the handling of</p><p>personally identifiable information. Such fears</p><p>are becom- ing a significant barrier to the</p><p>wide adoption of cloud service.</p><p>To allay users concerns, it is essential to</p><p>provide an effective mechanism for users to monitorthe usage of their data in the cloud. For example,</p><p>users need to be able to ensure that their data arehandled according to the service-level agreementsmade at the time they sign on for services in thecloud. Conventional access control approachesdeveloped for closed domains such as databases andoperating systems, or approaches using a centralizedserver in distributed environments, are not suitable,due to the following features characterizing cloudenvironments. First, data handling can be outsourced</p><p>by the direct cloud service provider (CSP) to otherentities in the cloud and theses entities can alsodelegate the tasks to others, and so on. Second,entities are allowed to join and leave the cloud in a</p><p>flexible manner. As a result, data handling in thecloud goes through a complex and dynamichierarchical service chain which does not exist inconventional environments.</p><p>To overcome the above problems, wepropose a novel approach, namely Cloud InformationAccountability (CIA) framework, based on the notionofinformation accountability[44]. Unlike privacy</p><p>protection technologies which are built on the hide-it-or-lose-it perspective, information account-abilityfocuses on keeping the data usage transparent and</p><p>trackable. Our proposed CIA framework providesend-to-end accountability in a highly distributedfashion. One of the main innovative features of theCIA framework lies in its ability of maintaininglightweight and powerful account-ability thatcombines aspects of access control, usage control andauthentication. By means of the CIA, data owners cantrack not only whether or not the service-levelagreements are being honored, but also enforceaccess and usage control rules as needed. Associatedwith the accountability feature,we also develop two distinct modes for auditing pushmode and pull mode. The push mode refers to logs</p><p>being periodically sent to the data owner orstakeholder while the pull mode refers to an</p>http://www.ijcstjournal.org/http://www.ijcstjournal.org/http://www.ijcstjournal.org/</li><li><p>8/12/2019 Achieving Secure cloud Data Sharing</p><p> 2/9</p><p>I nternational Jour nal of Computer Science Trends &amp; Technology - Volume1 I ssue1, Jul -Aug 2013</p><p>ISSN: 2347-8578 http://www.ijcstjournal.org/ Page 29</p><p>alternative approach whereby the user (or anotherauthorized party) can retrieve the logs as needed.</p><p>The design of the CIA framework presentssubstantial challenges, including uniquely identifyingCSPs, ensuring the reliability of the log, adapting to ahighly decentralized infrastructure, etc. Our basic</p><p>approach toward addressing these issues is toleverage and extend the programmablecapability of JAR (Java ARchives) files toautomatically log the usage of the users data by anyentity in the cloud. Users will send their data alongwith any policies such as access control policies andlogging policies that they want to enforce, enclosedin JAR files, to cloud service providers.</p><p>Any access to the data will trigger anautomated and authenticated logging mechanismlocal to the JARs. We refer to this type ofenforcement as strong binding since the policiesand the logging mechanism travel with the data. This</p><p>strong binding exists even when copies of the JARsare created; thus, the user will have control over hisdata at any location. Such decentralized loggingmechanism meets the dynamic nature of the cloud butalso imposes challenges on ensuring the integrity ofthe logging. To cope with this issue,we provide the JARs with a central point of contactwhich forms a link between them and the user. Itrecords the error correction information sent by theJARs, which allows it to monitor the loss of any logsfrom any of the JARs. Moreover, if a JAR is not ableto contact its central point, any access to its encloseddata will be denied.</p><p>Currently, we focus on image files sinceimages represent a very common content type for endusers and organiza-tions (as is proven by the</p><p>popularity of Flickr [14]) and are increasingly hostedin the cloud as part of the storage services offered bythe utility computing paradigm featured</p><p>by cloud computing. Further, images often revealsocial and personal habits of users, or are used forarchiving important files from organizations. Inaddition, our approach can handle personalidentifiable information provided they are stored asimage files (they contain an image of any textualcontent, for example, the SSN stored as a .jpg file).</p><p>We tested our CIA framework in a cloudtestbed, theEmulab testbed [42], with Eucalyptus asmiddleware [41].Our experiments demonstrate theefficiency, scalability and granularity of ourapproach. In addition, we also provide a detailedsecurity analysis and discuss the reliability andstrength of our architecture in the face of variousnontrivial attacks, launched by malicious users or dueto compro-mised Java Running Environment (JRE).</p><p>In summary, our main contributions are asfollows:</p><p>1.We propose a novel automatic and</p><p>enforceable logging mechanism in the cloud. To ourknowledge, this is the first time a systematic</p><p>approach to data accountability through the novelusage of JAR files is proposed.</p><p>2. Our proposed architecture is platformindependent and highly decentralized, in that it doesnot require any dedicated authentication or storagesystem in place.</p><p>3. We go beyond traditional access controlin that we provide a certain degree of usage controlfor the protected data after these are delivered to thereceiver.</p><p>4. We conduct experiments on a real cloudtestbed.The results demonstrate the efficiency,scalability, and granularity of our approach. We also</p><p>provide a detailed security analysis and discuss thereliability and strength of our architecture.</p><p>II. RELATED WORK</p><p>In this section, we first review related works</p><p>addressing the privacy and security issues in thecloud. Then, we briefly discuss works which adoptsimilar techniques as our approach but serve fordifferent purposes.</p><p>A. Cloud Privacy and SecurityCloud computing has raised a range of</p><p>importantprivacy and security issues. Such issues aredue to the fact that, in the cloud, users data andapplications reside at least for a certain amount oftime on the cloud cluster which is owned andmaintained by a third party.</p><p>Concerns arise since in the cloud it is notalways clear to individuals why their personalinformation is requested or how it will be used or</p><p>passed on to other parties. To date, little work hasbeen done in this space, in particular with respect toaccountability. Pearson et al. have proposedaccountability mechanisms to address privacyconcerns of end users and then develop a privacymanager.</p><p>Their basic idea is that the users private</p><p>data are sent to the cloud in an encrypted form, andthe processing is done on the encrypted data. Theoutput of the processing Is deobfuscated by the</p><p>privacy manager to reveal the correct result.However, the privacy manager provides only limitedfeatures in that it does not guarantee protection oncethe data are being disclosed. In [7], the authors</p><p>present a layered architecture for addressing the end-to-end trust management and accountability problemin federated systems. The authors focus is verydifferent from ours, in that they mainly leverage trustrelationships for account-ability, along withauthentication and anomaly detection. Further, theirsolution requires third-party services to complete themonitoring and focuses on lower level monitoring ofsystem resources.</p><p>B. Other Related Techniques</p>http://www.ijcstjournal.org/http://www.ijcstjournal.org/http://www.ijcstjournal.org/</li><li><p>8/12/2019 Achieving Secure cloud Data Sharing</p><p> 3/9</p><p>I nternational Jour nal of Computer Science Trends &amp; Technology - Volume1 I ssue1, Jul -Aug 2013</p><p>ISSN: 2347-8578 http://www.ijcstjournal.org/ Page 30</p><p>With respect to Java-based techniques forsecurity, our methods are related to self-defendingobjects (SDO). Self-defending objects are anextension of the object-oriented programming</p><p>paradigm, where software objects that offer sensitive</p><p>functions or hold sensitive data are responsible forprotecting those functions/data. Similarly, we alsoextend the concepts of object-oriented programming.The key difference in our implementations is that theauthors still rely on a centralized database to maintainthe access records, while the items being protectedare held as separate files. In previous work, we</p><p>provided a Java-based approach to prevent privacyleakage from indexing, which could be integratedwith the CIA framework proposed in this work sincethey build on related architectures.</p><p>In terms of authentication techniques, Appeland Felten proposed the Proof-Carrying</p><p>authentication (PCA) framework. The PCA includesa high order logic language that allows quantificationover predicates, and focuses on access control forweb services. While related to ours to the extent thatit helps maintaining safe, high-performance, mobilecode, the PCAs goal is highly different from ou rresearch, as it focuses on validating code, rather thanmonitoring content. Another work is by Mont et al.who proposed an approach for strongly couplingcontent with access control, using Identity-BasedEncryption (IBE)</p><p>We also leverage IBE techniques, but in avery different way. We do not rely on IBE to bind the</p><p>content with the rules. Instead, we use it to providestrong guarantees for the encrypted content and thelog files, such as protection against chosen plaintextand cipher text attacks.</p><p>In addition, our work may look similar toworks on secure data provenance but in fact greatlydiffers from them in terms of goals, techniques, andapplication domains. Works on data provenance aimto guarantee data integrity by securing the data</p><p>provenance. They ensure that no one can add orremove entries in the middle of a provenance chainwithout detection, so that data are correctly deliveredto the receiver. Differently, our work is to provide</p><p>data accountability, to monitor the usage of the dataand ensure that any access to the data is tracked.Since it is in a distributed environment, we also logwhere the data go. However, this is not for verifyingdata integrity, but rather for auditing whether datareceivers use the data following specified policies.</p><p>Along the lines of extended contentprotection, usage control is being investigated as anextension of current access control mechanisms.Current efforts on usage control are primarily focusedon conceptual analysis of usage control requirementsand on languages to express constraints at various</p><p>level of granularity . While some notable results havebeen achieved in this respect thus far, there is no</p><p>concrete contribution addressing the problem ofusage constraints enforcement, especially indistributed settings . The few existing solutions are</p><p>partial restricted to a single domain, and oftenspecialized. Finally, general outsourcing techniqueshave been investigated over the past few years.</p><p>Although only is specific to the cloud, some of theoutsourcing protocols may also be applied in thisrealm. In this work, we do not cover issues of datastorage security which are a complementary aspect ofthe privacy issues.</p><p>III. PROBLEM STATEMENT</p><p>We begin this section by considering an illustrativeexample which serves as the basis of our problemstatement and will be used throughout the paper todemonstrate the main features of our system.</p><p>Example 1. Alice, a professional photographer, plansto sell her photographs by using the Sky High CloudServices. For her business in the cloud, she has thefollowing requirements:</p><p>1. Her photographs are downloaded only by users</p><p>who have paid for her services.</p><p>2. Potential buyers are allowed to view her picturesfirst before they make the payment to obtain thedownload right.3. Due to the nature of some of her works, only usersfrom certain countries can view or download somesets of photographs.</p><p>4. For some of her works, users are allowed toonlyview them for a limited time, so that the userscannot reproduce her work easily.5. In case any dispute arises with a client, she wantstohave all the access information of that client.</p><p>6. She wants to ensure that the cloud serviceproviders of SkyHigh do not share her data with otherservice providers, so that the accountability providedfor individual users can also be expected from thecloud service providers.</p><p>With the above s...</p></li></ul>

Recommended

View more >