Design and Development of Refuge and Retrieve Controller Estimation for Cloud Data Centers


  • S. Ravichandran HoD & Professor, Department of Computer Science, Shree Chandraprabhu Jain College, Tamil Nadu, India
  • A. P. Babu HoD, Department of Computer Applications, Shree Chandraprabhu Jain College, Tamil Nadu, India



JAR Records, Cloud Information Accountability, SDA, Pull Mode, Push Mode, PCA


Cloud server farms appropriate the common information to the clients. In cloud climate consumers' material is normally organized distantly in vague machineries that consumers don't claim or effort respectively. Client information control is decreased on information sharing under remote machines. Incorporated checking applications are not reasonable for profoundly powerful information access climate. Information access the executives should be possible through the cloud specialist co-ops (CSP). Cloud Data auditing plans are utilized to screen the common information esteems. Cloud Information Accountability (CIA) system is an exceptionally decentralized data responsibility model. CIA system joins parts of access control, use control and validation. Two unmistakable modes are produced for inspecting push mode and pull mode. The push mode alludes to logs being occasionally shipped off the information proprietor or partner. The force mode alludes to the client or one more approved party can recover the logs depending on the situation. Container (Java ARchives) records are utilized to consequently log the use of the clients' information by any substance in the cloud. Circulated evaluating systems are additionally used to fortify client's control. The information are sending alongside access control approaches and logging arrangements encased in JAR records, to cloud specialist organizations. Any admittance to the information will trigger a mechanized and verified logging system nearby to the JARs. The Push and Pull mode log recovery calculation is utilized for the log the board interaction.  Information evaluating and security plans are coordinated to give client log data to the common information. The Cloud Information Accountability (CIA) system is improved to give verification plan to JAR records. The framework consolidates the information and runtime uprightness check measure. Log information examination is furnished with ordering and collection capacities. The framework incorporates information and executable access control model.


Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,” Proc. European Conf. Research in Computer Security (ESORICS), pp. 355-370, 2019.

Cloud Security Alliance, “Security as a Service: Defined Categories of Service,” 2018.

A. Pretschner, F. Schuo¨ tz, C. Schaefer and T. Walter, “Policy Evolution in Distributed Usage Control,” Electronic Notes Theoretical Computer Science, Vol. 244, pp. 109-123, 2019.

R. Hasan, R. Sion, and M. Winslett, “The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance,” Proc. Seventh Conf. File and Storage Technologies, pp. 1-14, 2018.

R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, “Towards a Theory of Accountability and Audit,” Proc. 14th European Conf. Research in Computer Security (ESORICS), pp. 152-167, 2018.

W. Lee, A. Cinzia Squicciarini, and E. Bertino, “The Design and Evaluation of Accountable Grid Computing System,” Proc. 29th IEEE Int’l Conf. Distributed Computing Systems, pp. 145-154, 2019.

Smitha Sundareswaran, Anna C. Squicciarini, and Dan Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud”, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 4, July/August 2018.

S. Sundareswaran, A. Squicciarini, D. Lin, and S. Huang, “Promoting Distributed Accountability in the Cloud,” Proc. IEEE Int’l Conf. Cloud Computing, 2018.

A. Squicciarini, S. Sundareswaran, and D. Lin, “Preventing Information Leakage from Indexing in the Cloud,” Proc. IEEE Int’l Conf. Cloud Computing, 2019.

S. Pearson, Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing,” Proc. Int’l Conf. Cloud Computing (CloudCom), 2019.




How to Cite

Ravichandran, S., & Babu, A. P. (2021). Design and Development of Refuge and Retrieve Controller Estimation for Cloud Data Centers. Asian Journal of Computer Science and Technology, 10(2), 34–40.

Most read articles by the same author(s)