Agent based public audit for secured cloud storage

Authors

  • Pal VK Asst. Prof. Bharath University Chennai-600073
  • Roy R Asst. Prof. Bharath University Chennai-600073
  • MICHAEL G Asst. Prof. Bharath University Chennai-600073

Keywords:

cloud computing, kernel

Abstract

Operating system kernels typically enforce lowest restrictions on the applications permissible to execute leading to the power of malicious programs to abuse system resources. Malware running as standalone processes will freely execute enjoying the privileges provided to the user account running the method. Main stream software package kernels lack a robust and reliable mechanism for distinctive the running processes and binding them to the corresponding possible applications. Method authentication is completely different from method identification. Our supervisor call instruction observances are often integrated with existing obligatory access management systems to enforce application-level access rights. We tend to address the identification downside by proposing a unique secure application identification model within which user-level applications square measure needed to gift identification proofs at run time to be genuine to the kernel. Our supervisor call instruction observance is often integrated with existing obligatory access management systems to enforce application-level access rights.

References

H.M.J. Almohri, D. Yao, and D. Kafura, “Identifying Native Applications with High Assurance,” Proc. ACM Conf. Data and Application Security and Privacy (CODASPY ’12), Feb. 2012.

P. Loscocco and S. Smalley, “Integrating Flexible Support for Security Policies into the Linux Operating System,” Proc. USENIX Ann. Technical Conf., 2001.

“grsecurity,” http://www.grsecurity.net/, 2013.

Z.M.H. Chen and N. Li, “Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems,” Proc. 16th Ann. Network and Distributed System Security Symp., 2009.

C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah- Hartman, “Linux Security Module Framework,” Proc. 11th Ottawa Linux Symp., 2002.

K. Xu, H. Xiong, D. Stefan, C. Wu, and D. Yao, “Data-Provenance Verification for Secure Hosts,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 173-183, Mar./Apr. 2012.

W. Dai, T.P. Parker, H. Jin, and S. Xu, “Enhancing Data Trustworthiness via Assured Digital Signing,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 6, pp. 838-851, Nov./Dec. 2012.

G. Xu, C. Borcea, and L. Iftode, “Satem: Trusted Service Code Execution across Transactions,” Proc. IEEE 25th Symp. Reliable Distributed Systems (SRDS ’06), pp. 321-336, 2006.

A.M. Fiskiran and R.B. Lee, “Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution,” Proc. IEEE Int’l Conf. Computer Design: VLSI in Computers and Processors (ICCD ’04), pp. 452-457, 2004.

T. Jaeger and R. Sandhu, Operating System Security. Morgan & Claypool, 2008.

Downloads

Published

2024-02-26

How to Cite

Pal, V. K., Roy, R., & MICHAEL, G. (2024). Agent based public audit for secured cloud storage. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(04), 1673–1679. Retrieved from https://ijact.in/index.php/j/article/view/295

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.