Enhancing the Cloud Security by Using Identity Based Multicloud Architecture

Authors

  • Warhade RG PG Scholar: Dept. of Computer Engineering, GSMCOE, Pune
  • Vankudothu B Professor: Dept. of Computer Engineering,GSMCOE, Pune

Keywords:

cloud, cloud security, data security, splitting, identity

Abstract

In today’s IT world Cloud computing is emerging as a most powerful technology. Cloud provides the user with the resources on a pay-as-you go basis, which fulfils the demand of most of the industries. Security challenges are the biggest obstacles in adopting cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues the cloud paradigm comes with a new set of unique features, which open the path towards novel security approaches, techniques and architectures. This paper provides a scheme to enhance the security of stored data in the cloud by using multiple clouds and identity verification of the user.

References

J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono, and N. Marnau, “Security and Privacy-Enhancing Multi-cloud Architectures,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 10, NO. 4, JULY/AUGUST 2013

Kan Yang, Ren, Xiaohua Jia, Bo Zhang, and Ruitao Xie, “DACMACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems,” IEEE 2013

P. Mell and T. Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, Tech. Rep., Sept 2011.

Jing-Jang Hwang and Hung-Kai Chuang, ” A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service,” National Science Council of Taiwan Government, IEEE, 2012

J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, “Security Prospects through Cloud Computing by Adopting Multiple Clouds,” Proc. IEEE Fourth Int’l Conf. Cloud Computing (CLOUD), 2011.

M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On Technical Security Issues in Cloud Computing,” in Proceeding of IEEE Int’l Conf. Cloud Computing (CLOUD-II), 2009.

Kan Yang, Xiaohua Jia, ” Attributed-based Access Control for Multi-Authority Systems in Cloud Storage,” in Proceeding of 2012 32nd IEEE International Conference on Distributed Computing Systems , IEEE ,2012.

Prashant Kumar,Lokesh Kumar,” Security Threats to Cloud Computing”, International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), Volume 2, No. 1, December 2013

Downloads

Published

2024-02-26

How to Cite

Warhade, R. G., & Vankudothu, B. (2024). Enhancing the Cloud Security by Using Identity Based Multicloud Architecture. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(07), 1931–1933. Retrieved from https://ijact.in/index.php/j/article/view/340

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.