Multi Tiered Security and Privacy- Enhancing Multi-cloud Environment

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-1
Year of Publication : 2015
Authors : Akanksha Rana, Srinivas Arukonda
  10.14445/22312803/IJCTT-V23P102

MLA

Akanksha Rana, Srinivas Arukonda "Multi Tiered Security and Privacy- Enhancing Multi-cloud Environment". International Journal of Computer Trends and Technology (IJCTT) V23(1):7-11, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Technology and its advancement lead us to research for the next level of the advancement. In the context of the Cloud computing which we can tell as the technological advancement plays the vital role in the industry of Information Technology. In this paper, we have given emphasis on the Privacy and security involved in the multicloud architecture. The big threat to cloud is the security which has not yet robust and need much more advancement to give the client that is the best solution especially in the industry domain if banking and financial services. Apart from the above mentioned domain other domains are fair and fine enough to us the technology. In this one we use the data partitioning and the security of the node and agent based cryptography, which will provide the tiered or layered security.

References
[1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing, Version 15,” Nat’l Inst. of Standards and Technology, Information Technology Laboratory, vol. 53, p. 50, http://csrc.nist.gov/groups/SNS/cloud-computing/, 2010.
[2] F. Gens, “IT Cloud Services User Survey, pt.2: Top Benefits & Challenges,” blog, http://blogs.idc.com/ie/?p=210, 2008.
[3] Gartner, “Gartner Says Cloud Adoption in Europe Will Trail U.S. by at Least Two Years,” http://www.gartner.com/it/page. jsp?id=2032215, May 2012.
[4] J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, “Security Prospects through Cloud Computing by Adopting Multiple Clouds,” Proc. IEEE Fourth Int’l Conf. Cloud Computing (CLOUD), 2011.
[5] D. Hubbard and M. Sutton, “Top Threats to Cloud Computing V1.0,” Cloud Security Alliance, http://www.cloudsecurityalliance.org/topthreats, 2010.
[6] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On Technical Security Issues in Cloud Computing,” Proc. IEEE Int’l Conf. Cloud Computing (CLOUD-II), 2009.
[7] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), pp. 199- 212, 2009.
[8] Y. Zhang, A. Juels, M.K.M. Reiter, and T. Ristenpart, “Cross-VM Side Channels and Their Use to Extract Private Keys,” Proc. ACM Conf. Computer and Comm. Security (CCS ’12), pp. 305-316, 2012.
[9] N. Gruschka and L. Lo Iacono, “Vulnerable Cloud: SOAP Message Security Validation Revisited,” Proc. IEEE Int’l Conf. Web Services (ICWS ’09), 2009.
[10] M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and Countermeasures,” Proc. Workshop Secure Web Services, pp. 20-27, 2005.
[11] J. Kincaid, “Google Privacy Blunder Shares Your Docs without Permission,” TechCrunch, http://techcrunch.com/2009/03/07/huge-google-privacyblunder- shares-your-docs-withoutpermission/, 2009.
[12] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces,” Proc. Third ACM Workshop Cloud Computing Security Workshop (CCSW ’11), pp. 3-14, 2011.
[13] S. Bugiel, S. Nu¨ rnberger, T. Po¨ppelmann, A.-R. Sadeghi, and T. Schneider, “AmazonIA: When Elasticity Snaps Back,” Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 389-400, 2011.
[14] D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, “Blueprint for the Intercloud—Protocols and Formats for Cloud Computing Interoperability,” Proc. Int’l Conf. Internet and Web Applications and Services, pp. 328-336, 2009.
[15] A. Celesti, F. Tusa, M. Villari, and A. Puliafito, “How to Enhance Cloud Architectures to Enable Cross- Federation,” Proc. IEEE Third Int’l Conf. Cloud Computing (CLOUD), pp. 337-345, 2010.
[16] R. Turpin and B.A. Coan, “Extending Binary Byzantine Agreement to Multivalued Byzantine Agreement,” Information Processing Letters, vol. 18, no. 2, pp. 73-76, 1984.
[17] I. Koren and C.M.C. Krishna, Fault-Tolerant Systems. Morgan Kaufmann, 2007.

Keywords
Cloud, security, privacy, multi-cloud, application partitioning, tier partitioning, data partitioning, multiparty computation.