An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment

Authors

  • Indoria P M. Tech, Dept.of Computer Science and Engineering Dept. of Computer Science and Engineering Shekhawati Engineering College, Dundlod, Rajasthan
  • Didel A Dept. of Computer Science and Engineering, Shekhawati Engineering College, Dundlod, Rajasthan

Keywords:

Cloud Computing, Cloud environment, Resource sharing

Abstract

Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable computing needs grow. However, one of the most important challenges for the cloud as the backup and protection of data and processes information from users. Security of cloud computing environment is a new research area, the further development of both the associations of academic and industrial research. In order to create secure and reliable services in cloud computing environment is major concerning issue.

This paper focuses more on the subject related to the securely resource sharing and privacy aspects in cloud computing environment, such as data integrity, data compromise, service availability. It proposes a new approach “An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment”. It is based on multi-cloud service providers and the secret sharing key with object oriented hierarchy. This approach mainly considers three clouds in which bursting and aggregation operation had been performed and includes many object oriented aspects based on some parameter were analyzed. We also used secure sharing mechanism so that the cloud resources are shared among different cloud environment.

References

http://csrc.nist.gov/groups/SNS/cloudcomputing/clouddef-v 15.doc.

Cloud Security Alliance, “Top Threats to Cloud Computing v1.0,” Prepared by the Cloud Security Alliance, March 2010, pp. 1-14.

Jouni Mäenpää, “Cloud Computing with the Azure Platform,” TKK T-110.5190 Seminar on Internet Working, April 27, 2009.

Feng-Tse Lin, Teng-San Shih, “Cloud Computing: The Emerging Computing Technology,” ICIC Express Letters Part B: Applications (ISSN: 2185-2766), v1, September 2010, pp. 33-38.

http://aws.amazon.com

Amazon Web Service, Amazon Elastic Compute Cloud, User Guide, API Version, August 31, 2010.

Google, “Google app Engine,”http://code.google.com/appengine.

http://www.salesforce.com.

Sun Microsystems, “Introduction to Cloud Computing Architecture,” White paper, 1st Edition, June 2009, pp. 1-40.

Sayaka Akioka and Yoichi Muraoka, “HPC Benchmarks on Amazon EC2,” 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), April 20-23, 2010, IEEE, pp. 1029-1034.

Marko Vukolic, “The Byzantine Empire in the Intercloud,” ACM SIGACT News, Volume 41 Issue 3, September, 2010, pp. 105-111.

Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon, “RACS: a case for cloud storage diversity,” Proceedings of the 1st ACM symposium on Cloud computing, Indianapolis, IN, Jun10-11, 2010, pp. 229-240.

Yi Hu, Bin Gong, Fengyu Wang, “Cloud ModelBased Security-aware and Fault-Tolerant Job Scheduling for Computing Grid,” 2010 Fifth

Annual China Grid Conference, July 16-18, 2010, IEEE, pp. 25-30.

Hai Zhong, Kun Tao, Xuejie Zhang, “An Approach to Optimized Resource Scheduling Algorithm for Open-source Cloud Systems,” 2010 Fifth Annual China Grid Conference (China Grid), July 16-18, 2010, IEEE, pp. 124-129.

Yu Weng, Changjun Hu, Xiaoming Zhang, Huayu Li, “Alert Monitoring Cloud: Psychological Health Analysis of Web Text in Cloud,” 2010 Fifth Annual China Grid Conference (China Grid), July 16-18, 2010, IEEE, pp. 152-159.

Hughes, Jumeily and Hussain, “Supporting Cloud Computing Management through an Object Mapping Declarative Language,” 2010 Developments in E-systems Engineering, London, United Kingdom, September 06-08, 2010, IEEE, pp. 175-181.

Srijith K. Nair, Sakshi Porwal, Theo Dimitrakos, Ana Juan Ferrer, Johan Tordsson, Tabassum Sharif, Craig Sheridan, Muttukrishnan Rajarajan, and Afnan Ullah Khan, “Towards Secure Cloud Bursting, Brokerage and Aggregation,” Proceedings of the 2010 Eighth IEEE European Conference on Web Services (ECOWS 10), December 1-3, 2010, IEEE, pp. 189-196.

Mohammed A. AlZain, Ben Soh and Eric Pardede, “MCDB: Using Multi-Clouds To Ensure Security In Cloud Computing,” In Proceedings of

the Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing, December 11, 2011, IEEE.

Md Kausar Alam, Sharmila Banu K, “An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds,”

International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013, pp.1-5.

Downloads

Published

2024-02-26

How to Cite

Indoria, P., & Didel, A. (2024). An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(12), 404–409. Retrieved from https://ijact.in/index.php/j/article/view/71

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.