A Novel Approach for Data Storage Security in Multicloud Computing

Authors

  • K. Parthiban University College of Engineering (BIT CAMPUS), Tiruchirappalli, Tamil Nadu, India
  • V. M. Priyadharshini University College of Engineering (BIT CAMPUS), Tiruchirappalli, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajeat-2014.3.1.700

Keywords:

Multicloud, security, privacy, cloud, partitioning

Abstract

In cloud a service the main tedious problems are security and secrete maintains of the information, with the help of Multicloud services security can be enhanced and privacy can be maintained. Along with these data are encrypted by the data owner and that data are stored in cloud database. It will be more secured. For sharing the resource and information Multicloud approach can be performed. Data owner maintains the information security, The cloud is general storage any one can access the service. Many security problem raised in cloud computing. However, despite the potential gains achieved from the cloud computing freely accessible resource is still questionable which impacts the cloud adoption. Many misusing problem arise in cloud computing .To solve this problem multiple cloud approach and encrypting technique is used is proposed for enhancing security and privacy.

References

P. Mell and T. Grance, “The NIST Definition of Cloud Computing, Version 15,” Nat’l Inst. of Standards and Technology, Information Technology Laboratory, vol. 53, p. 50, http://csrc.nist.gov/groups/ SNS/cloud-computing/, 2010.

F. Gens, “IT Cloud Services User Survey, pt.2: Top Benefits & Challenges,” blog, http://blogs.idc.com/ie/?p=210, 2008.

Gartner, “Gartner Says Cloud Adoption in Europe Will Trail U.S. by at Least Two Years,” http://www.gartner.com/it/page. jsp?id=2032215, May 2012. Fig.1Proposed System Design

J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, “Security Prospects through Cloud Computing by Adopting Multiple Clouds,” Proc. IEEE Fourth Int’l Conf. Cloud Computing (CLOUD), 2011.

D. Hubbard and M. Sutton, “Top Threats to Cloud Computing V1.0,” Cloud Security Alliance, http://www. cloudsecurityalliance. org/topthreats, 2010.

M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On Technical Security Issues in Cloud Computing,” Proc. IEEE Int’l Conf. Cloud Computing (CLOUD-II), 2009.

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third- Party Compute Clouds,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), pp. 199-212, 2009.

Y. Zhang, A. Juels, M.K.M. Reiter, and T. Ristenpart, “Cross-VM Side Channels and Their Use to Extract Private Keys,” Proc. ACM Conf. Computer and Comm. Security (CCS ’12), pp. 305-316, 2012.

N. Gruschka and L. Lo Iacono, “Vulnerable Cloud: SOAP Message Security Validation Revisited,” Proc. IEEE Int’l Conf. Web Services (ICWS ’09), 2009.

M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and Countermeasures,” Proc. Workshop Secure Web Services, pp. 20-27, 2005.

J. Kincaid, “Google Privacy Blunder Shares Your Docs without Permission,” TechCrunch, http://techcrunch. com/2009/03/07/huge-google-privacy-blunder-shares-your-docswithoutpermission/, 2009.

J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces,” Proc. Third ACM Workshop Cloud Computing Security Workshop (CCSW ’11), pp. 3-14, 2011.

S. Bugiel, S. Nu¨ rnberger, T. Po¨ppelmann, A.-R. Sadeghi, and T.Schneider, “AmazonIA: When Elasticity Snaps Back,” Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 389-400, 2011.

D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, “Blueprint for the Intercloud—Protocols and Formats for Cloud Computing Interoperability,” Proc. Int’l Conf. Internet and Web Applications and Services, pp. 328-336, 2009.

Downloads

Published

05-05-2014

How to Cite

Parthiban, K., & Priyadharshini, V. M. (2014). A Novel Approach for Data Storage Security in Multicloud Computing. Asian Journal of Engineering and Applied Technology, 3(1), 27–30. https://doi.org/10.51983/ajeat-2014.3.1.700