Manuscript Number : IJSRSET152262
Enhancing Security of Multi-cloud Architecture using combination of approaches
Authors(3) :-A. Linda Alice, P.M.C Nisha, S.Sivagami
In Public cloud when it is used for the practical application which is outside the User’s premises, there are several security issues are arising. These can be overcome by the use multi cloud architecture there they are using four kinds of approach like replication of application, partition application system into tiers ,partition of application logic into fragments , partition of data into fragments. In each every approach there are benefits and pitfalls. In the proposed paper we are initiating the idea of combining more than one approach so as to reach security features like integrity, confidentiality, availability, applicability, ease of use and compliance.
A. Linda Alice
cloud, web server, cloud computing, Resource pooling, IaaS, Paas, SaaS
[1] "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011. Publication Details
Published in :
Volume 1 | Issue 2 | March-April 2015 Article Preview
Department of Information Technology, Velammal Institute of Technology, Anna University, India
P.M.C Nisha
Department of Information Technology, Velammal Institute of Technology, Anna University, India
S.Sivagami
Department of Information Technology, Velammal Institute of Technology, Anna University, India
[2] Rouse, Margaret. "What is a multi-cloud strategy". Search Cloud Applications. Retrieved July 2014.
[3] F. Gens, “IT Cloud Services User Survey, pt.2: Top Benefits &Challenges,†Blog post on IDC Survey, 2008. [Online]. Available: http://blogs.idc.com/ie/?p=210
[4] J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L. L. Iacono, “Security prospects through cloud computing by adopting multiple clouds,†in 4th IEEE International Conference on Cloud Computing (CLOUD). IEEE, 2011.
[5] Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, and Ninja Marnau, "Security and Privacy Enhancing Multi-Cloud Architectures",
[6] S. Kamara and K. Lauter, Cryptographic cloud storage,†Financial Cryptography and Data Security, pp. 136–149, 2010.
[7] F. Pagano and D. Pagano, “Using in-memory encrypted databases on the cloud,†in Proceedings of the 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.
[8] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,†in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79–88.
[9] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange,J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions,†in Advances in Cryptology–CRYPTO 2005. Springer, 2005, pp. 205–222
Date of Publication :
2015-04-25
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) :
250-253
Manuscript Number :
IJSRSET152262
Publisher : Technoscience Academy
Journal URL :
https://ijsrset.com/IJSRSET152262