Madhu B R et al, International Journal of Computer Science and Mobile Computing, Vol.8 Issue.6, June- 2019, pg. 95-99
© 2019, IJCSMC All Rights Reserved 95
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IMPACT FACTOR: 6.199
IJCSMC, Vol. 8, Issue. 6, June 2019, pg.95 – 99
SECURE DATA SHARING ON
CLOUD USING TRANSPARENCY
SERVICE MODEL
Madhu B R; M Sindhu; H A Aravinda; Aishwarya S; Nesara A M
Department of Computer Science and Engineering
School of Engineering and Technology, Jain University, Bangalore, Karnataka, India
Abstract— Cloud technology enables data-sharing capabilities, which benefits the user through greater
productivity and efficiency. However, the Cloud is susceptible to many privacy and security vulnerabilities.
Thus, there is a strong demand for data owners to not only ensure that their data kept private and secure in
the Cloud, but also have control over their own data.
If meta-data is compromised, then unapproved access to the client data is possible. For the protection of
client data, we present a Transparency Service Model in this research project. TSM provides a mechanism
where cloud provider configures the service on the cloud by giving the service information about the cloud
storage devices that would contain the data. It is then responsibility of the TSM to store data on those devices
and cloud provider no longer has direct access to data storage on those devices.
Keywords— Transparency service model, IaaS (Infrastructure as a service), Cloud service provider
I. INTRODUCTION
Today cloud computing has emerged as a field of great innovation in the computer world. Still various issues
persist in this field with data security and data privacy. This is because; the cloud provider has access to the data
and monitors the client’s information. Due to this reason, the data owners strongly demand to keep their data
private and secure on the cloud. The users also desire to have control over the data contents that they share with
other users. Therefore, it becomes necessary to have a cryptographically enhanced access control over the
shared data. For the protection of client data, we present a Transparency Service Model in this research project.
TSM provides a mechanism where cloud provider configures the service on the cloud by giving the service
information about the cloud storage devices that would exist the data. It is then responsibility of the TSM to
store data on those devices and cloud providers no longer direct access to data storage on those devices.
The cloud system has various security threats and risks. Few of which are mentioned below:
i. Malware Injection: With this threat, the exploiters try to inject malicious programs, codes or services in
the cloud.
ii. Spoofing: It is another type of attack mainly used to spoof Meta data information.
iii. Service Hijacking: In this thread the hackers can hack into a web service hosted on the cloud and install
malicious software to get valuable user data and information.
iv. Threat from Insiders, Shared Resource Problems, Vulnerabilities, Access Control