<p style="text-align: center;"><span style="color: #75a13b; font-size: 14pt;">Secured Storage of Outsourced Data in Cloud Computing<br /></span></p> <table style="width: 647px; height: 160px;"> <tbody style="background-color: #ffffff; text-align: left; border-width: 0px;"> <tr style="background-color: #ffffff; border-style: none; border-width: 0px;"> <td style="background-color: #ffffff; border-style: none; border-width: 0px;" rowspan="6">&nbsp; <img src="/images/ijctt-book.png" alt="IJCOT-book-cover" /><br />&nbsp;</td> <td style="background-color: #ffffff; border-style: none; border-width: 0px;"><strong><span style="font-family: verdana,geneva; font-size: 10pt; border-style: none; border-color: #ffffff;">International Journal of Computer Trends and Technology (IJCTT)</span></strong></td> <td style="background-color: #ffffff; border-style: none; border-width: 0px;" rowspan="6">&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp; <br />&nbsp; <a href="/Volume3/issue-1/IJCTT-V3I1P129.pdf" target="_blank"><img src="/images/PDF3.png" alt="" /></a></td> </tr> <tr style="border-width: 0px;"> <td style="background-color: #ffffff; text-align: left; border-width: 0px;"><span style="font-size: 10pt; font-family: verdana,geneva;">© - Issue 2012 by IJCTT Journal</span></td> </tr> <tr style="background-color: #ffffff; text-align: left; border-width: 0px;"> <td style="background-color: #ffffff; text-align: left; border-width: 0px;"><span style="font-family: verdana,geneva; font-size: 10pt;">Volume-3 Issue-1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<br /></span></td> </tr> <tr style="background-color: #ffffff; text-align: left; border-width: 0px;"> <td style="background-color: #ffffff; text-align: left; border-width: 0px;"><span style="font-family: verdana,geneva; font-size: 10pt;">Year of Publication : 2012</span></td> </tr> <tr style="background-color: #ffffff; text-align: left; border-width: 0px;"> <td style="background-color: #ffffff; text-align: left; border-width: 0px;"><strong><span style="color: #ff6600;">Authors</span></strong><span style="color: #ff6600;"> :</span><span style="color: #ff6600;"><span style="color: #000000;">Chiranjeevi Kasukurthy, Ch. Ramesh Kumar. </span></span></td> </tr> </tbody> </table> <p style="text-align: left;"><span style="font-family: arial,helvetica,sans-serif; font-size: 10pt; color: #0d4c89;"><img src="/images/citation.gif" alt="MLA" /></span></p> <p style="text-align: justify;"><span style="font-size: 10pt;"><span lang="ES"><span style="color: #ff6600;"><span style="color: #000000;">Chiranjeevi Kasukurthy, Ch. Ramesh Kumar.</span></span>"Secured Storage of Outsourced Data in Cloud Computing"<em>International Journal of Computer Trends and Technology (IJCTT)</em>,V3(1):144-148 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.</span> </span></p> <p style="text-align: justify;"><span style="color: #0d4c89;"><strong>Abstract:&nbsp;</strong></span>- Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. Cloud data storage redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer’s point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability, can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. Our results show that, our proposed model provides a better decision for customers according to their available budgets.</p> <p class="IEEEHeading1" style="margin-left: 0in; text-indent: 0in; text-align: justify;"><strong><span style="color: #0d4c89;">References-</span></strong></p> <p style="text-align: justify;">[1] M. Armbrust, A. Fox, R. Grifth, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical report, University of California at Berkeley, February 2009. <br />[2] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599– 616, 2009. <br />[3] P. Mell, T. Grance, “Draft NIST working definition of cloud computing”, Referenced on June. 3rd, 2009, Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009. <br />[4] Amazon.com, “Amazon s3 availablity event: July 20, 2008”, Online at http://status.aws.amazon.com/s3- 20080720.html, 2008.</p> <p style="text-align: justify;"><span style="color: #0d4c89;"><strong>Keywords</strong></span> — Cloud computing, Linear programming, Data storage.</p>