A New Framework for Cloud Computing security using Secret Sharing Algorithm over Single to Multi- Clouds
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - August Issue 2013 by IJCTT Journal|
|Volume-4 Issue-8 |
|Year of Publication : 2013|
|Authors :Venkatarao Matte, L. Ravi Kumar|
Venkatarao Matte, L. Ravi Kumar"A New Framework for Cloud Computing security using Secret Sharing Algorithm over Single to Multi- Clouds"International Journal of Computer Trends and Technology (IJCTT),V4(8):2820-2824 August Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. In cloud computing, the word cloud is used as a metaphor for the Internet, so the phrase are delivered to an organization`s computers cloud computing means "a type of Internet-based computing," where different services such as servers, storage and applications and devices through the Internet. Presently implementation of cloud computing has increased rapidly in IT industry and in other organization also. Cloud is a collection of distributed database. It provides number of benefit such that low cost and accessibility of data. If a data is store only at single place and unfortunately that data has been lost then there is no recovery of data. Cloud computing gives us a solution to store a number of copy of data, in this manner if a data is going to be loss at one place that can be retrieved from other place. The problem of service unavailability has been solved by using cloud computing, which was a major concern in single cloud. In recently days use of multi cloud becoming popular because its provide the major benefit of service availability. As much of benefit coming with multi- cloud computing, that much security issues also coming with it. A cloud user is storing their information in clouds, those cloud provider can be untrusted, the information stored by user can be sensitive and in cloud there may be a chances of availability of malicious and anomaly which can harm user sensitive data. So security of data in multi-cloud computing is a major concern. In this paper we are going to discuss about functionality of single and multi cloud computing and security threats. In several researches on fact is coming out that the work done for maintainability of multi cloud security concern is less than the cost and work dome for single cloud. This research promotes the use of multiclouds due to ability of reducing security threats that affect the sensitive data of user. In this paper we will give a solution for security concern of data in multiclouds. Here we will show that in respect of storing user actual data , we are going to store encrypted data in cloud for which we will use plain cipher encryption algorithm of cryptography.
K. Birman, G. Chockler and R. van Renesse,"Toward a cloud computing research agenda", SIGACT News, 40, 2009, pp. 68-80.
 K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS`09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp. 187-198.
C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud", Research Report RZ, 3783, 2010.
 C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
 C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded Byzantine distributed storage", DISC:Proc. 19thIntl.Conf. on Distributed Computing, 2005, pp. 497-498.
M. Castro and B. Liskov, "Practical Byzantine fault tolerance", Operating Systems Review, 33, 1998, pp. 173-186.
 G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, "Reliable distributed storage", Computer, 42, 2009, pp. 60-67.
Clavister, "Security in the cloud", Clavister White Paper, 2008. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October2010, pp. 1-14.
S.L. Garfinkel, "Email-based identification and authentication: An alternative to PKI?", IEEE Security and Privacy, 1(6), 2003, pp. 20- 26.
Keywords : —— Cloud computing, single cloud, mutli-cloud, security, cryptography.