In Public cloud when it is used for the practical application which is outside the User’s premises, there are several security issues are arising. These can be overcome by the use multi cloud architecture there they are using four kinds of approach like replication of application, partition application system into tiers ,partition of application logic into fragments , partition of data into fragments. In each every approach there are benefits and pitfalls. In the proposed paper we are initiating the idea of combining more than one approach so as to reach security features like integrity, confidentiality, availability, applicability, ease of use and compliance.
A. Linda Alice, P.M.C Nisha, S.Sivagami
cloud, web server, cloud computing, Resource pooling, IaaS, Paas, SaaS
' "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.
 Rouse, Margaret. "What is a multi-cloud strategy". Search Cloud Applications. Retrieved July 2014.
 F. Gens, “IT Cloud Services User Survey, pt.2: Top Benefits &Challenges,” Blog post on IDC Survey, 2008. [Online]. Available: http://blogs.idc.com/ie/?p=210
 J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L. L. Iacono, “Security prospects through cloud computing by adopting multiple clouds,” in 4th IEEE International Conference on Cloud Computing (CLOUD). IEEE, 2011.
 Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, and Ninja Marnau, "Security and Privacy Enhancing Multi-Cloud Architectures",
 S. Kamara and K. Lauter, Cryptographic cloud storage,” Financial Cryptography and Data Security, pp. 136–149, 2010.
 F. Pagano and D. Pagano, “Using in-memory encrypted databases on the cloud,” in Proceedings of the 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.
 R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79–88.
 M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange,J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions,” in Advances in Cryptology–CRYPTO 2005. Springer, 2005, pp. 205–222