Empirical Auditing for Computing in Preserving Manner
Keywords:
Cloud computing, distributed server, Data storage, presence services, cost effective, Mobile computingAbstract
Cloud server technology is widely used nowadays for huge and secure Data Storage. However a recent study in wireless devices noticed that usage of data traffic is immense in size. It is found that application does not follow the power distribution law with the observations made in popular Social networking & Map navigation applications. Most traffic is due to extraneous data like presence information from GPS, Availability at instantaneous rate will overload the traffic. The transmitted data will have replicate values and it is almost useless to transfer the data repeatedly. This paper proposes the Intellectual Dynamic Audit Service (IDAS) is a superset of Third Party Auditor (TPA), which will instantly help to reduce the notification of traffic data in the client device itself without disturbing the Quality of service (QOS). QOS level is well maintained by usage of Firewall Anomaly Management Environment (FAME) normally used in the verification of packets send from the application to server. Pre-audit for cloud storage is activated for traffic data reduction. Hence the originality of data to be transferred can be checked easily using snapshot created by IDAS.
References
Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage” IEEE Transactions on Computers, Vol. 62, No. 2, Page no (362- 375), February 2013.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), Page no (598-609), November 2007.
Chi-Jen Wu, Jan-Ming Ho, and Ming-Syan Chen, "A Scalable Server Architecture for Mobile Presence Services in Social Network Applications" IEEE Transactions On Mobile Computing, Vol. 12, No. 2, Page No (386-398), Feb 2013.
M.A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,” Cryptology ePrint Archive, Report No. HPL-2008/186, 2008.
C. Chi, R. Hao, D. Wang, and Z.-Z. Cao, “IMS Presence Server: Traffic Analysis and Performance Modeling,” Proc. IEEE International Conference on Network Protocols (ICNP), ISBN-1-4244-2507-5, 2008.
M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), Page No (1-6), 2007.
Z. Xiao, L. Guo, and J. Tracey, “Understanding Instant Messaging Traffic Characteristics,” Proc. IEEE 27th International Conference on Distributed Computing Systems (ICDCS), ISBN-0-7695-2837-3, Page No (7-14) 2007.
Mobile device forensics, http://en.wikipedia.org/wiki/Mobile_device_forensics, 2013.
Social Networking, http://en.wikipedia.org/wiki/Social_networking, 2013.
Global Positioning System, http://en.wikipedia.org/wiki/Global_Positioning_System, 2013.
P. Bellavista, A. Corradi, and L. Foschini, “IMS-Based Presence Service with Enhanced Scalability and Guaranteed QoS for Interdomain Enterprise Mobility,” IEEE Wireless Comm., vol. 16,no. 3, Page No (16-23), June 2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
