Authorization Based Secure Data Transaction in Cloud Computing

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-11 Number-9
Year of Publication : 2014
Authors : V.Vamsikrishna , P.Boominathan
  10.14445/22315381/IJETT-V11P289

MLA 

V.Vamsikrishna , P.Boominathan. "Authorization Based Secure Data Transaction in Cloud Computing", International Journal of Engineering Trends and Technology (IJETT), V11(9),446-449 May 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Analyze in cloud computing be in the receipt of distributed process in transacting database utilize over cloud servers entities work in the evidence of authorization that are given an explanation for collection certified proof of authority. The proof and status it’s corrected and collects over the expended a point of time duration below the threat of process an authority policy of the client confident actuality not available circumstances. In this paper we focus on the felt finding of the problem we are defining the normal understanding trusted transaction when we are dealing with the proof of authorization in cloud computing and users can obtain there computation and storage to servers and it is also called cloud. Cloud can make available for use different like application ex (Google apps, what’s app) a large amount of data stored in clouds it’s highly quick to detect security and privacy. It is more important problems in cloud computing. The users must authenticate itself before initialization of any transaction it must be make sure that the cloud are other clients the cloud computing it keep the clients accounts is the facts it outsources the cloud computing itself responsible to the service part from the specialist solution make sure the secure and lack of disturbance and it is also require for code implementation.

References

[1] M. Armbrust et al., “Above the clouds: A Berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep., Feb. 2012.
[2] S. Das, D. Agrawal, and A. El Abbadi, “Elastras: an elastic transactional data store in the cloud,” in USENIX HotCloud, 2011.
[3] D. J. Abadi, “Data management in the cloud: Limitations and opportunities,”IEEE Data Engineering Bulletin, Mar. 2010.
[4] A. J. Lee and M. Winslett, “Safety and consistency in policy-based authorization systems,” in ACM CCS, 2012.
[5] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, “X.509, internet public key infrastructure online certificate status protocol - ocsp,” RFC 2560, Jun. 1999, http://tools.ietf.org/html/rfc5280.
[6] E. Rissanen, “extensible access control markup language (xacml) version 3.0,” Jan. 2013, http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
[7] D. Cooper et al., “Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile,” RFC 5280, May 2008, http://tools.ietf.org/html/rfc5280.
[8] J. Li, N. Li, and W. H. Winsborough, “Automated trust negotiation using cryptographic credentials,” in ACM CCS, Nov. 2005.
[9] L. Bauer et al., “Distributed proves in access-control systems,” in Proc. of the IEEE Symposium on Security and Privacy, May 2005.
[10] J. Li and N. Li, “OACerts: Oblivious attribute based certificates,” IEEE TDSC, Oct. 2006.
[11] J. Camenisch and A. Lysyanskaya, “An efficient system for nontransferable anonymous credentials with optional anonymity revocation,” in EUROCRYPT, 2001.
[12] P. K. Chrysanthis, G. Samaras, and Y. J. Al-Houmaily, “Recovery and performance of atomic commit processing in distributed database systems,” in Recovery Mechanisms in Database Systems. PHPTR, 1998.
[13] Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Marian K. Iskander Tucker Trainor Dave W. Wilkinson Adam J. Lee Panos K. Chrysanthis Department of Computer Science, University of Pittsburgh {marianky, tmt33, dwilk, adamlee, panos}@cs.pitt.edu.

Keywords
Authorization, Security, Two phase validation protocol, two phase validation commits protocol.