Cloud Auditing

769 Words2 Pages

But, if the intruder gets the algorithm of the sentinel application on data, then the data can be breached easily. Hence, it appeared ineffective in due course of time. Thus a need of specific system rose to have such process which can monitor the cloud without adding any sentinels. Hence, demand of more improvised Auditor emerged which can provide effective integrity assurance for database services. Due to absence of such Auditor, have led to many inevitable situations, for example, recently a big robbery of data had occurred in the South Korea of three major banks. It had shown major drawbacks in the security and storage mechanism of IT infrastructure. The data which was robbed contained information like monthly card usage, card numbers, salaries etc, which had led to a lot of tension among the account holders. The card holders were running towards the bank for cancelling the card, so that no money from their account could be transferred. This episode pro-vided a lesson to keep the storage servers watertight, protected and detect prohibited action of culprits. In IT industry, large improvements in authentication system, firewalls and data access has to be made to avoid such incident in future. The presented work checks the integrity of data, so that no part of data could be modified, deleted and inserted without user permission. This paper provides users, the freedom of examining the integrity which observes indifferently toward both Cloud service providers (CSP) as well Data Owners. Monitoring of data needs requires profound study of database storage as well as methods of data transfer and access which is a very complex job. The methods must be reliable and must be transparent so that questions will not arise on the way of work...

... middle of paper ...

...may be completely or partially deleted for saving space and maintenance cost, the user came to know only when it tries to retrieve it. The goal of the paper is provide such an automatic mechanism which is impartial to both and follow the simple and efficient methods that are fast and error-free which provide notifications to user when Data Storage System behaves illicitly. To make the Audit system more effective the various obstacles and opportunities like Data lock-in, Data transfer bottlenecks, etc., in Cloud are considered [10].
The rest of the paper structured as follows: In, Section II explain research background and related work. Section III addresses audit techniques and system architecture with actual implementation. In, Section IV the experimental results were discussed along with limitations and future work in Section V and finally conclude in Section VI.

Open Document