Enhancing Security of Multi-cloud Architecture using combination of approaches

Authors(3) :-A. Linda Alice, P.M.C Nisha, S.Sivagami

In Public cloud when it is used for the practical application which is outside the User’s premises, there are several security issues are arising. These can be overcome by the use multi cloud architecture there they are using four kinds of approach like replication of application, partition application system into tiers ,partition of application logic into fragments , partition of data into fragments. In each every approach there are benefits and pitfalls. In the proposed paper we are initiating the idea of combining more than one approach so as to reach security features like integrity, confidentiality, availability, applicability, ease of use and compliance.

Authors and Affiliations

A. Linda Alice
Department of Information Technology, Velammal Institute of Technology, Anna University, India
P.M.C Nisha
Department of Information Technology, Velammal Institute of Technology, Anna University, India
S.Sivagami
Department of Information Technology, Velammal Institute of Technology, Anna University, India

cloud, web server, cloud computing, Resource pooling, IaaS, Paas, SaaS

[1] "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.
[2] Rouse, Margaret. "What is a multi-cloud strategy". Search Cloud Applications. Retrieved July 2014.
[3] F. Gens, “IT Cloud Services User Survey, pt.2: Top Benefits &Challenges,” Blog post on IDC Survey, 2008. [Online]. Available: http://blogs.idc.com/ie/?p=210
[4] J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L. L. Iacono, “Security prospects through cloud computing by adopting multiple clouds,” in 4th IEEE International Conference on Cloud Computing (CLOUD). IEEE, 2011.
[5] Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, and Ninja Marnau, "Security and Privacy Enhancing Multi-Cloud Architectures",
[6] S. Kamara and K. Lauter, Cryptographic cloud storage,” Financial Cryptography and Data Security, pp. 136–149, 2010.
[7] F. Pagano and D. Pagano, “Using in-memory encrypted databases on the cloud,” in Proceedings of the 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.
[8] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79–88.
[9] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange,J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions,” in Advances in Cryptology–CRYPTO 2005. Springer, 2005, pp. 205–222

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 250-253
Manuscript Number : IJSRSET152262
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

A. Linda Alice, P.M.C Nisha, S.Sivagami, " Enhancing Security of Multi-cloud Architecture using combination of approaches, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.250-253, March-April-2015.
Journal URL : http://ijsrset.com/IJSRSET152262

Follow Us

Contact Us