Enabling Data Security for Collective Records in the Cloud
Muthulakshmi V1, Ahamed Yaseen A2, Santhoshkumar D3, Vivek M4

1Ass.Prof. Muthulakshmi V,  Department of IT., Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.
2Mr. Ahamed Yaseen A, Department of IT., Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.
3Mr.SanthoshKumar D, Department of IT., Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.
4Mr. Vivek M, Department of IT., Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.

Manuscript received on 21 March 2013 | Revised Manuscript received on 28 March 2013 | Manuscript published on 30 March 2013 | PP: 163-167 | Volume-2 Issue-1, March 2013 | Retrieval Number: A0547032113/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is a computing paradigm in which tasks are assigned to a combination of connections, software and services that can be accessed over internet. A major advantage of a cloud computing is enabling the distributed or remote access from known or unknown machines at any time. While Accessing the Cloud Services, the data owner faces a lot of issues related to security services (while sharing their data). To overcome these security issues, we provide automated – decentralized mechanism to capture and monitor the every usage of the users from various location. In this paper, we proposed a logging mechanism to keep track of the actual usage of the system. We leverage the jar file mechanism to ensure any data access will trigger authentication and automated logging mechanism. To consolidate user’s control, we provide distributed auditing mechanisms, we also provide comprehensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.
Keywords: Cloud computing, Data sharing, Data security

Scope of the Article: Cloud computing