Enhancing the Cloud Security by Using Identity Based Multicloud Architecture
Keywords:
cloud, cloud security, data security, splitting, identityAbstract
In today’s IT world Cloud computing is emerging as a most powerful technology. Cloud provides the user with the resources on a pay-as-you go basis, which fulfils the demand of most of the industries. Security challenges are the biggest obstacles in adopting cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues the cloud paradigm comes with a new set of unique features, which open the path towards novel security approaches, techniques and architectures. This paper provides a scheme to enhance the security of stored data in the cloud by using multiple clouds and identity verification of the user.
References
J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono, and N. Marnau, “Security and Privacy-Enhancing Multi-cloud Architectures,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 10, NO. 4, JULY/AUGUST 2013
Kan Yang, Ren, Xiaohua Jia, Bo Zhang, and Ruitao Xie, “DACMACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems,” IEEE 2013
P. Mell and T. Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, Tech. Rep., Sept 2011.
Jing-Jang Hwang and Hung-Kai Chuang, ” A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service,” National Science Council of Taiwan Government, IEEE, 2012
J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, “Security Prospects through Cloud Computing by Adopting Multiple Clouds,” Proc. IEEE Fourth Int’l Conf. Cloud Computing (CLOUD), 2011.
M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On Technical Security Issues in Cloud Computing,” in Proceeding of IEEE Int’l Conf. Cloud Computing (CLOUD-II), 2009.
Kan Yang, Xiaohua Jia, ” Attributed-based Access Control for Multi-Authority Systems in Cloud Storage,” in Proceeding of 2012 32nd IEEE International Conference on Distributed Computing Systems , IEEE ,2012.
Prashant Kumar,Lokesh Kumar,” Security Threats to Cloud Computing”, International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), Volume 2, No. 1, December 2013
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.