Secure and Reliable Cloud Security from Single to Multi Clouds

International Journal of Computer Trends and Technology (IJCTT)
© 2014 by IJCTT Journal
Volume-16 Number-2
Year of Publication : 2014
Authors : Adla Shekhar , Janapati Venkata Krishna


Adla Shekhar , Janapati Venkata Krishna. "Secure and Reliable Cloud Security from Single to Multi Clouds". International Journal of Computer Trends and Technology (IJCTT) V16(2):77-80, Oct 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
now a day many organizations are using cloud computing and it’s rapidly increased. The usage of Cloud computing is low cost it provides more profits and accessibility of data. In cloud computing environment the major factor is ensuring the security for cloud computing, in the cloud sensitive information can be stored by the user and the cloud storage providers may be untrusted. Single cloud computing is less popular with the customer due to risk of service availability and there is a chance of misusage insiders will enter in single cloud. A motion towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has occurred recently. This paper studies recent investigation related to single and multi-cloud security and addresses likely solutions. It is found that the investigation into the use of multi-cloud service providers to keep security has received less attention from the study community than has the use of single clouds. This effort aims to help the use of multi-clouds due to its capability to reduce security threats that move the cloud computing user.

[1] (NIST),
[2] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387-408.
[3] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1s ACM symposium on Cloud computing, 2010, pp. 229-240.
[4] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as a Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data Engineering, 2009, pp. 1709-1716.
[5] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.
[6] Amazon, Amazon Web Services. Web services licensing agreement, October3,2006.
[7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable data possession at untrusted stores", Proc. 14th ACM MOBICOM, pages 92–103, 2008. Conf. on Computer and communications security, 2007, pp. 598-609.
[8] A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46.
[9] K. Birman, G. Chockler and R. van Renesse,"Toward a cloud computing research agenda", SIGACT News, 40, 2009, pp. 68-80.
[10] K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp. 187-198.
[11] C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud", Research Report RZ, 3783, 2010.
[12] C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
[13] C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded Byzantine distributed storage", DISC:Proc. 19thIntl.Conf. on Distributed Computing, 2005, pp. 497-498.
[14] M. Castro and B. Liskov, "Practical Byzantine fault tolerance", Operating Systems Review, 33, 1998, pp. 173-186.
[15] G. Chockler, R. Guerraoui, I. Keidar and M Vukolic, "Reliable distributed storage", Computer, 42, 2009, pp. 60-67.

Cloud computing, single cloud, multi-cloud, cloud storage.