Multi-Cloud Based Framework for Improved Service Availability and Security

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-4                           
Year of Publication : 2013
Authors :L.Naveen Kumar , K.Kiran Reddy

MLA

L.Naveen Kumar , K.Kiran Reddy"Multi-Cloud Based Framework for Improved Service Availability and Security"International Journal of Computer Trends and Technology (IJCTT),V5(4):175-178 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Cloud computing has been recognized by the world as a new model of computing that enables users to access huge computing resources. This has been made possible due to the commoditization of computing resources through cloud computing technology. Users from any corner of the world can avail cloud services without making capital investment. However, they are supposed to pay bills as per the usage. Though the technology brings about plethora of benefits to individuals and organizations, they cause security concerns as well. This is because users are to store their data in untrusted servers believing in the security mechanisms of cloud service providers. With a single provider there is risk of data theft, failure and service availability problems. This problem can be addressed by moving from single to multicloud thus having more options that can reduce risk and improve availability of service. In this paper we built multicloud environment. We develop a custom simulator that demonstrates the proof of concept. The empirical results revealed that the proposed multicloud approach is effective and feasible.

References

-
[1] S. Subashini and V. Kavitha, "A survey on securityissues in service delivery models of cloudcomputing", Journal of Network and ComputerApplications, 34(1), 2011, pp 1-11.
[2] M.A. AlZain and E. Pardede, "Using Multi Sharesfor Ensuring Privacy in Database-as-a-Service",44th Hawaii Intl. Conf. on System Sciences(HICSS), 2011, pp. 1-9.
[3] A. Bessani, M. Correia, B. Quaresma, F. André andP. Sousa, "DepSky: dependable and secure storagein a cloud-of-clouds", EuroSys`11:Proc. 6thConf. OnComputer systems, 2011, pp. 31-46.
[4] F. Rocha and M. Correia, "Lucy in the Sky withoutDiamonds: Stealing Confidential Data in theCloud", Proc. 1stIntl. Workshop of Dependabilityof Clouds, Data Centers and Virtual ComputingEnvironments, 2011, pp. 1-6.
[5] H. Abu-Libdeh, L. Princehouse and H.Weatherspoon, "RACS: a case for cloud storage diversity", SoCC`10:Proc. 1st ACM symposium onCloud computing, 2010, pp. 229-240.
[6] C. Cachin, R. Haas and M. Vukolic, "Dependablestorage in the Intercloud", Research Report RZ,3783, 2010.
[7] A.J. Feldman, W.P. Zeller, M.J. Freedman andE.W. Felten, "SPORC: Group collaboration usinguntrusted cloud resources", OSDI, October2010, pp. 1-14.
[8] E. Grosse, J. Howie, J. Ransome, J. Reavis and S.Schmidt, "Cloud computing roundtable", IEEESecurity& Privacy, 8(6), 2010, pp. 17-23.
[9] S. Kamara and K. Lauter, "Cryptographic cloudstorage", FC`10: Proc. 14thIntl.Conf. onFinancialcryptograpy and data security,2010, pp. 136-149.
[10] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M. Dahlin and M. Walfish, "Depot: Cloud storagewith minimal trust", OSDI`10: Proc. of the 9thUSENIX Conf. on Operating systems design andimplementation, 2010, pp. 1-16.
[11] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.Michalevsky and D. Shaket, "Venus: Verificationfor untrusted cloud storage", CCSW`10: Proc.ACM workshop on Cloud computing securityworkshop, 2010, pp. 19-30.
[12] H. Takabi, J.B.D. Joshi and G.-J.Ahn, "Securityand Privacy Challenges in Cloud ComputingEnvironments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31.
[13] K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahigh-availability and integrity layer for cloudstorage", CCS`09: Proc. 16th ACM Conf. onComputer and communications security, 2009, pp.187-198.
[14] C. Cachin, I. Keidar and A. Shraer, "Trusting thecloud", ACM SIGACT News, 40, 2009, pp. 81-86.
[16] T. Ristenpart, E. Tromer, H. Shacham and S.Savage, "Hey, you, get off of my cloud: exploringinformation leakage in third-party computeclouds", CCS`09: Proc. 16thACM Conf. onComputer and communications security, 2009, pp.199-212.
[17] N. Santos, K.P. Gummadi and R. Rodrigues,"Towards trusted cloud computing", USENIXAssociation, 2009, pp. 3-3.
[18] C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuringdata storage security in cloud computing",ARTCOM`10: Proc. Intl. Conf. on Advances inRecent Technologies in Communication andComputing, 2010, pp. 1-9.
[19] S.L. Garfinkel, "An evaluation of amazon’s gridcomputing services: EC2, S3, and QS", TechnicalReport TR-08-07, Computer Science Group,Harvard University, Citeseer, 2007, pp. 1-15.
[20] J. Hendricks, G.R. Ganger and M.K. Reiter, "Lowoverheadbyzantine fault-tolerant storage",SOSP`07: Proc. 21st ACM SIGOPS symposium onOperating systems principles, 2007, pp. 73-86.
[21] RedHat, https://rhn.redhat.com/errata/RHSA-2008-0855.html.
[22] Sun, http://blogs.sun.com /gbrunett/entry/ amazon_s3_silent_data_corruption.
[23] S.L. Garfinkel, "Email-based identification andauthentication: An alternative to PKI?",IEEESecurity and Privacy, 1(6), 2003, pp. 20-26.
[24] Amazon, Amazon Web Services. Web serviceslicensing agreement, October3,2006.
[25] H. Krawczyk, M. Bellare and R. Canetti, "HMAC:Keyed-hashing for message authentication",Citeseer, 1997, pp. 1-11.

Keywords :— Cloud computing, security, single cloud, multi-clouds .