We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Comparative Study of Security Mechanisms in Multi-cloud Environment

by Monali Shrawankar, Ashish Kr. Shrivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 6
Year of Publication: 2013
Authors: Monali Shrawankar, Ashish Kr. Shrivastava
10.5120/13396-1039

Monali Shrawankar, Ashish Kr. Shrivastava . Comparative Study of Security Mechanisms in Multi-cloud Environment. International Journal of Computer Applications. 77, 6 ( September 2013), 9-13. DOI=10.5120/13396-1039

@article{ 10.5120/13396-1039,
author = { Monali Shrawankar, Ashish Kr. Shrivastava },
title = { Comparative Study of Security Mechanisms in Multi-cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 6 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number6/13396-1039/ },
doi = { 10.5120/13396-1039 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:49:32.154049+05:30
%A Monali Shrawankar
%A Ashish Kr. Shrivastava
%T Comparative Study of Security Mechanisms in Multi-cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 6
%P 9-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The advantage of cloud computing is everlasting but it brings more issues including security. Double-checking the security of cloud computing is a foremost factor in the cloud computing natural environment, as users often store sensitive data with cloud storage providers but these providers may be untrusted. Cloud storage providers may be single cloud or multi-cloud. But it is found that the research into the use of multi-clouds providers to maintain security has received less attention from the research community than the use of single clouds. This paper surveys many running research related to single clouds and multi-clouds security and address possible solutions and methodology. The main focus of this paper is use of multi-clouds and data security and reduce security risks. This paper gives a comparative analysis of various security mechanisms like HAIL[8], ICStore[10], RACS[9], DepSky model[7] using secret sharing algorithms[14]. Thus it could assist in analyzing best fit scenario for elegant secured cloud computing environment.

References
  1. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, 34(1), 2011, pp 1-11.
  2. Md. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi, "A surveys on gaps, threat remediation challenge, and some thoughts for proactive attack detection in the cloud computing", School of Information and Communication Technology, CQ University QLD 4702, Australia. Received 15 August 2011. Revised 11 January 2012. Accepted 18 January 2012. Available online 27 January 2012.
  3. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
  4. Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, "Security and Privacy in Cloud Computing: A Survey", Sixth International Conference on Semantics, Knowledge and Grids, August 2010.
  5. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom, "Cloud Computing Security: From Single to Multi-Clouds",2012 ,45th Hawaii International Conference on System Sciences.
  6. M. Vukolic,"The Byzantine empire in theintercloud", ACM SIGACT News, 41,2010, pp. 105-111.
  7. A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46.
  8. K. D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp. 187-198.
  9. H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240.
  10. C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud", Research Report RZ, 3783, 2010.
  11. G. Chockler, R. Guerraoui, I. Keidar, and M. Vukoli´c, "Reliable distributed storage," IEEE Computer, vol. 42, no. 4, pp. 60–67, 2009.
  12. F. Rocha and M. Correia, "Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud", Proc. 1stIntl. WorkshopDependabilityof Clouds, Data Centers and Virtual Computing Environments, 2011, pp. 1-6.
  13. H. Takabi, J. B. D. Joshi and G. -J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31.
  14. Shamir, "How to share a secret", Communications of the ACM, 22(11), 1979, pp. 612-613.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Single cloud Multi-clouds Cloud storage Data integrity Data intrusion Service availability