Open Access   Article Go Back

Usage of Multiple Clouds to increase Security in Cloud Computing

Ch.A. Kumar1 , K.S. Rao2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-5 , Page no. 123-125, May-2014

Online published on May 31, 2014

Copyright © Ch.A. Kumar, K.S. Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ch.A. Kumar, K.S. Rao, “Usage of Multiple Clouds to increase Security in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.123-125, 2014.

MLA Style Citation: Ch.A. Kumar, K.S. Rao "Usage of Multiple Clouds to increase Security in Cloud Computing." International Journal of Computer Sciences and Engineering 2.5 (2014): 123-125.

APA Style Citation: Ch.A. Kumar, K.S. Rao, (2014). Usage of Multiple Clouds to increase Security in Cloud Computing. International Journal of Computer Sciences and Engineering, 2(5), 123-125.

BibTex Style Citation:
@article{Kumar_2014,
author = {Ch.A. Kumar, K.S. Rao},
title = {Usage of Multiple Clouds to increase Security in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {123-125},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=171},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=171
TI - Usage of Multiple Clouds to increase Security in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Ch.A. Kumar, K.S. Rao
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 123-125
IS - 5
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3562 3437 downloads 3625 downloads
  
  
           

Abstract

In today�s world Cloud computing has emerged like as a new model of computing. It is a paradigm shift in the computing history. Cloud services are ready to available without capital investment as they are commoditized. Cloud users may get services in pay per use fashion and enjoy so many benefits of cloud computing including less cost and accessibility from anywhere in the world. However, users have security issues as they outsource their secret business data to cloud and treat the cloud as �untrusted�. By using a single cloud service provider there might be the risk of service availability, possibility of failure and insider theft of data. By Moving towards multi clouds can address security problems. This paper aims of investigating how multiple-cloud can increase security and have impact on the usage of the cloud computing usage technology. We built a prototype application to simulate the advantages of using multiple-clouds to increase security. The empirical result shows that multiple-clouds can increase security.

Key-Words / Index Term

Cloud computing; Security; Single cloud; Multiple-clouds; Data integrity; Data intrusion; Service availability

References

[1] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, 34(1), 2011, pp.1-11.
[2] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensu [2] M.A. AlZain and E. Pardede, "Using Multi Shares for ensuring Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp.1-9.
[3] Bessani, M. Correia, B. Quaresma, F.Andr� and P. Sousa, "DepSky: dependable and EuroSys`11 : Proc. 6th Conf. On Computer Systems, 2011, pp.31-46.
[4] F. Rocha and M. Correia, "Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud", Proc. 1st Intl. Workshop of Dependability of Clouds, Data Centers and Virtual Computing Environments, 2011, pp.1-6.
[5] H.Abu-Libdeh, L. Prince house and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC`10 : Proc 1st ACM symposium on Cloud computing, 2010 , pp.229-240.
[6] C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Inter cloud", Research Report RZ,3783, 2010.
[7] A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October 2010, pp.1-14.
[8] E. Grosse, J. Howie, J. Ransome, J. Reavis and S.Schmidt, "Cloud computing roundtable", IEEE Security & Privacy, 8(6), 2010, pp.17-23.
[9] S. Kamara and K. Lauter, "Cryptographic cloud storage", FC`10: Proc. 14th Intl.Conf. On Financial cryptograpy and data security, 2010, pp.136-149.
[10] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M. Dahlin and M. Walfish, "Depot: Cloud storage with minimal trust", OSDI`10: Proc. of the 9th USENIX Conf. on Operating systems design and implementation, 2010, pp.1-16.
[11] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.Michalevsky and D. Shaket, "Venus: Verification for untrusted cloud storage", CCSW`10: Proc.ACM workshop on Cloud computing security workshop, 2010, pp.19-30.
[12] H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31.
[13] M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", HotSec`10: Proc. 5th USENIX Conf. on Hot topics in security, 2010, pp.1-8.
[14] K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS`09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp.187-198.
[15] C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp.81-86.
[16] Clavister, "Security in the cloud", Clavister White Paper, 2008.
[17] T.Ristenpart, E.Tromer, H.Shacham and S.Savage, �Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds:, CCS�- 09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp.199-212.
[18] N. Santos, K.P. Gummadi and R.Rodrigues, "Towards trusted cloud computing", USENIX Association, 2009, pp.3-3.
[19] C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data storage security in cloud computing", ARTCOM`10: Proc. Intl. Conf. on Advances in Recent Technologies in Communication and Computing, 2010, pp.1-9.
[20] S.L. Garfinkel, "An evaluation of Amazon�s grid computing services: EC2, S3, and QS", Technical Report TR-08- 07, Computer Science Group, Harvard University, Cite seer, 2007, pp.1-15.
[21] J. Hendricks, G.R. Ganger and M.K. Reiter, "Low over head by zantine fault-tolerant storage", SOSP`07: Proc. 21st ACM SIGOPS symposium on Operating systems principles, 2007, pp.73-86.
[22] RedHat,https://rhn.redhat.com/errata/RHSA-2008-0855.html.
[23] Sun,http://blogs.sun.com/gbrunett/entry/amazon_s3_silent_data_corruption.
[24] S.L. Garfinkel, "Email-based identification and authentication: An alternative to PKI?", IEEE Security and Privacy, 1(6), 2003, pp.20-26.
[25] Amazon, Amazon Web Services. Web services licensing agreement, October3, 2006.
[26] H. Krawczyk, M. Bellare and R. Canetti, "HMAC: Keyed-hashing for message authentication", Cite seer, 1997, pp.1-11.