CFP last date
20 December 2024
Reseach Article

Single to Distributed Cloud Computing Security

by Neha N. Latpate, S.B. Waykar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 4
Year of Publication: 2015
Authors: Neha N. Latpate, S.B. Waykar
10.5120/ijca2015906773

Neha N. Latpate, S.B. Waykar . Single to Distributed Cloud Computing Security. International Journal of Computer Applications. 130, 4 ( November 2015), 12-15. DOI=10.5120/ijca2015906773

@article{ 10.5120/ijca2015906773,
author = { Neha N. Latpate, S.B. Waykar },
title = { Single to Distributed Cloud Computing Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 4 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number4/23196-2015906773/ },
doi = { 10.5120/ijca2015906773 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:16.897796+05:30
%A Neha N. Latpate
%A S.B. Waykar
%T Single to Distributed Cloud Computing Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 4
%P 12-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is the actual concern of the cloud’s, because of it’s easy nature as a shared resource, identity management, privacy and access management. it is additional confidential issue give to provide correct security and different probably vulnerable areas became a priority for organizations acquiring with a cloud computing provide,.and it's relating to With additional organizations exploitation cloud computing and associated cloud suppliers for information operations. you may feel forced in your ability to barter through business disagreements with their provider,only when If crucial information and applications square measure obsessed with one cloud provider. This paper addresses doable solutions, for that surveys that is recent analysis associated with single and multi-cloud security. it's found that the analysis into the employment of multi-cloud suppliers to keep up security has received less attention from the analysis community that has the employment of single clouds. owing to its ability to scale back security risks that have an effect on the cloud computing user, this work aims to push the employment of multi-clouds.

References
  1. (NIST), http://www.nist.gov/itl/cloud/.
  2. I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387-408.
  3. H. Abu-Libdeh, L. Prince House and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240.
  4. D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as a Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data Engineering, 2009, pp. 1709-1716.
  5. M.A. AL Zain and E. Paredes, "Using Multi Shares for Ensuring Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.
  6. Amazon, Amazon Web Services. Web services licensing agreement, October3, 2006.
  7. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable data possession at untrusted stores", Proc. 14th ACM Conf. on Computer and communications security, 2007, pp. 598-609.
  8. A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46.
  9. K. Birman, G. Chockler and R. van Renessa, “Toward a cloud computing research agenda", SIGACT News, 40, 2009, pp. 68-80.
  10. K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp. 187-198.
  11. C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Interclouds", Research Report RZ, 3783, 2010.
  12. C. Cachin, I. Keidar and A. Sharer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
  13. C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded Byzantine distributed storage", DISC: Proc.19thIntl.Conf. On Distributed Computing, 2005, pp. 497-498.
  14. M. Castro and B. Liskov, "Practical Byzantine fault tolerance", Operating Systems Review, 33, 1998, pp. 173-186.
  15. G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, "Reliable distributed storage", Computer, 42, 2009, pp. 60-67.
  16. Clavister, "Security in the cloud", Clavister White Paper, 2008.
  17. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October2010, pp. 1-14.
  18. S.L. Garfinkel, "Email-based identification and authentication: An alternative to PKI?” IEEE Security and Privacy, 1(6), 2003, pp. 20-26.
  19. S.L. Garfinkel, "An evaluation of amazon’s grid computing services: EC2, S3, and SQS", Technical Report TR-08-07, Computer Science Group, Harvard University, Cite seer, 2007, pp. 1-15.
  20. E. . . Goh, H. Shacham, N. Modadugu and D. Boneh, "SiRiUS: Securing remote untrusted storage", NDSS: Proc. Network and Distributed System Security Symposium, 2003, pp. 131–145
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Security Distributed Cloud single to multi cloud environment.