Abstract
Now a day Cloud Computing is rapidly using computing technology. For low cost and high-end benefits this cloud computing is utilized. The major issue in this cloud computing is Ensuring the security, because the often store sensitive data with third party cloudproviders but these providers may beuntrusted.Working with single cloud is prevented, because in customer’s perception the failure in service availability and thepossibility of viciousgang in single cloud. To overcome these types of failures, a recent and popular technology is emerged called cloud of clouds or multi clouds or inters clouds. In this paper we illustrated the recent research towards multi clouds from single cloud and addressed possible solutions in security concern.Here we used the SSS (Secret Key Sharing) technique to share the key between servers. From this we can found that there is less attention in the field of multi cloud security compare with single cloud providers. The main intention of this work is to reduce the security risks related to cloud users and to encourage theuse of cloud- of -clouds due to its ability.
Highlights
Cloud ComputingThe cloud computing satisfied critical needs of secure storage, manage, share and analyze huge amount of complex data to predict the patterns and trends of information in order to improve the quality of healthcare systems, better nation safeguard and to explore alternative energy
Recent research has focused on the multi-cloud environment [3],[8],[10],[11] which avoids dependency on single cloud and controls several clouds.The multi cloud is divided into two layers Cachin et al inner cloud in bottom and inter cloud in top layer
The problem of the malicious insider in the cloudinfrastructure which is the base of cloud computing isconsidered by Rocha and Correia.Infrastructure as a Service (IaaS) cloud providers will provide the services like virtual machines where the users can run their software‟s. The old solution for this problem is to encrypt the user‟s data, but the manipulations on encrypted data on virtual machines are not at all possible
Summary
The cloud computing satisfied critical needs of secure storage, manage, share and analyze huge amount of complex data to predict the patterns and trends of information in order to improve the quality of healthcare systems, better nation safeguard and to explore alternative energy. The main cloud security threat is that the owner dints have control on his/her own data and where the data is placed. This is done due to the utilization of resource allocation and scheduling of cloud benefits. It provides access to heterogeneous IT resources, whichcan either be physical or virtual, as services over the Internet [1].Examples of provided resources include storage resources suchas those provided by Amazon S3 [2], computational resourcessuch as Amazon EC2 [3] and applications such as the Google AppEngine [4]. The combination of software layers, the virtualization layer and the management layer, allow for the effective management of servers
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.