International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 5 | Number 2 | Year 2013 | Article Id. IJCTT-V5N4P133 | DOI : https://doi.org/10.14445/22312803/IJCTT-V5N4P133

Multi-Cloud Based Framework for Improved Service Availability and Security


L.Naveen Kumar , K.Kiran Reddy

Citation :

L.Naveen Kumar , K.Kiran Reddy, "Multi-Cloud Based Framework for Improved Service Availability and Security," International Journal of Computer Trends and Technology (IJCTT), vol. 5, no. 2, pp. 175-178, 2013. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V5N4P133

Abstract

Cloud computing has been recognized by the world as a new model of computing that enables users to access huge computing resources. This has been made possible due to the commoditization of computing resources through cloud computing technology. Users from any corner of the world can avail cloud services without making capital investment. However, they are supposed to pay bills as per the usage. Though the technology brings about plethora of benefits to individuals and organizations, they cause security concerns as well. This is because users are to store their data in untrusted servers believing in the security mechanisms of cloud service providers. With a single provider there is risk of data theft, failure and service availability problems. This problem can be addressed by moving from single to multicloud thus having more options that can reduce risk and improve availability of service. In this paper we built multicloud environment. We develop a custom simulator that demonstrates the proof of concept. The empirical results revealed that the proposed multicloud approach is effective and feasible.

Keywords

Cloud computing, security, single cloud, multi-clouds.

References

[1] S. Subashini and V. Kavitha, "A survey on securityissues in service delivery models of cloudcomputing", Journal of Network and ComputerApplications, 34(1), 2011, pp 1-11. 
[2] M.A. AlZain and E. Pardede, "Using Multi Sharesfor Ensuring Privacy in Database-as-a-Service",44th Hawaii Intl. Conf. on System Sciences(HICSS), 2011, pp. 1-9.
[3] A. Bessani, M. Correia, B. Quaresma, F. André andP. Sousa, "DepSky: dependable and secure storagein a cloud-of-clouds", EuroSys'11:Proc. 6thConf. OnComputer systems, 2011, pp. 3146.
[4] F. Rocha and M. Correia, "Lucy in the Sky withoutDiamonds: Stealing Confidential Data in theCloud", Proc. 1stIntl. Workshop of Dependabilityof Clouds, Data Centers and Virtual ComputingEnvironments, 2011, pp. 1-6.
[5] H. Abu-Libdeh, L. Princehouse and H.Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium onCloud computing, 2010, pp. 229-240.
[6] C. Cachin, R. Haas and M. Vukolic, "Dependablestorage in the Intercloud", Research Report RZ,3783, 2010.
[7] A.J. Feldman, W.P. Zeller, M.J. Freedman andE.W. Felten, "SPORC: Group collaboration usinguntrusted cloud resources", OSDI, October2010, pp. 1-14.
[8] E. Grosse, J. Howie, J. Ransome, J. Reavis and S.Schmidt, "Cloud computing roundtable", IEEESecurity & Privacy, 8(6), 2010, pp. 17-23.
[9] S. Kamara and K. Lauter, "Cryptographic cloudstorage", FC'10: Proc. 14thIntl.Conf. on Financialcryptograpy and data security,2010, pp. 136-149.
[10] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M. Dahlin and M. Walfish, "Depot: Cloud storagewith minimal trust", OSDI'10: Proc. of the 9thUSENIX Conf. on Operating systems design andimplementation, 2010, pp. 1-16.
[11] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.Michalevsky and D. Shaket, "Venus: Verificationfor untrusted cloud storage", CCSW'10: Proc.ACM workshop on Cloud computing securityworkshop, 2010, pp. 19-30.
[12] H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Securityand Privacy Challenges in Cloud ComputingEnvironments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31.
[13] K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahighavailability and integrity layer for cloudstorage", CCS'09: Proc. 16th ACM Conf. onComputer and communications security, 2009, pp.187-198.
[14] C. Cachin, I. Keidar and A. Shraer, "Trusting thecloud", ACM SIGACT News, 40, 2009, pp. 81-86.
[15] Clavister, "Security in the cloud", Clavister WhitePaper, 2008.
[16] T. Ristenpart, E. Tromer, H. Shacham and S.Savage, "Hey, you, get off of my cloud: exploringinformation leakage in thirdparty computeclouds", CCS'09: Proc. 16thACM Conf. onComputer and communications security, 2009, pp.199-212.
[17] N. Santos, K.P. Gummadi and R. Rodrigues,"Towards trusted cloud computing", USENIXAssociation, 2009, pp. 3-3.
[18] C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuringdata storage security in cloud computing",ARTCOM'10: Proc. Intl. Conf. on Advances inRecent Technologies in Communication andComputing, 2010, pp. 1-9.
[19] S.L. Garfinkel, "An evaluation of amazon’s gridcomputing services: EC2, S3, and QS", TechnicalReport TR-08-07, Computer Science Group,Harvard University, Citeseer, 2007, pp. 1-15.
[20] J. Hendricks, G.R. Ganger and M.K. Reiter, "Lowoverheadbyzantine fault-tolerant storage",SOSP'07: Proc. 21st ACM SIGOPS symposium onOperating systems principles, 2007, pp. 73-86.
[21] RedHat, 0855.html.
[22] Sun, https://rhn.redhat.com/errata/RHSA-2008http://blogs.sun.com amazon_s3_silent_data_corruption.
[23] S.L. Garfinkel, "Email-based /gbrunett/entry/ identification andauthentication: An alternative to PKI?", IEEESecurity and Privacy, 1(6), 2003, pp. 20-26.
[24] Amazon, Amazon Web Services. Web serviceslicensing agreement, October3,2006.
[25] H. Krawczyk, M. Bellare and R. Canetti, "HMAC:Keyedhashing for message authentication",Citeseer, 1997, pp. 1-11.