CFP last date
20 December 2024
Reseach Article

Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

by Vidya Ch, N. Chandra Sekhar Reddy, G. Praveen Babu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 1
Year of Publication: 2014
Authors: Vidya Ch, N. Chandra Sekhar Reddy, G. Praveen Babu
10.5120/16760-6315

Vidya Ch, N. Chandra Sekhar Reddy, G. Praveen Babu . Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework. International Journal of Computer Applications. 96, 1 ( June 2014), 28-31. DOI=10.5120/16760-6315

@article{ 10.5120/16760-6315,
author = { Vidya Ch, N. Chandra Sekhar Reddy, G. Praveen Babu },
title = { Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 1 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number1/16760-6315/ },
doi = { 10.5120/16760-6315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:20:40.498450+05:30
%A Vidya Ch
%A N. Chandra Sekhar Reddy
%A G. Praveen Babu
%T Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 1
%P 28-31
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is the rising generation key platform for sharing the resources like software as a service, infrastructure as a service, and platform as a service. In future all IT enterprises migrate into cloud platform. Cloud server exchanges the messages for remote location users with the help of multi cloud architectures. Security issues are generated in data transmission. Day by day new vulnerabilities are discovered in cloud computing. Previous cloud development provides the security in limited dimensions with the help of application logic. It not sufficient for control the all different attackers. This is not efficient and scalable environment. It's not optimal approach [1]. Increase the range of cloud computing security and detect the attacks in deep degree manner. It provides highly safe results with good data protection. Here we concentrate on two dimensions. Those dimensions are application logic view and regulatory framework. Its have excellent security properties. This approach provides the excellent security compare to previous approaches. We proved different properties like good integrity and confidentiality compare to previous approaches [1][2].

References
  1. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, and Ninja Marnau, Security and Privacy-Enhancing Multi cloud Architectures, 2013
  2. Sven Bugiel, Stefan Nurnberger, Ahmad-Reza Sadeghi, Thomas Schneider ,Twin Clouds: Secure Cloud Computing with Low Latency, 2009
  3. Meiko Jensen, J¨org Schwenk, Jens-Matthias Bohli, Nils Gruschka, Luigi LoIacono Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011
  4. Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina ,Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, 2009
  5. Hassan Takabi and James B. D. Joshi, Gail-JoonAhn Security and Privacy Challenges in loud Computing Environments, 2010
  6. Jeff Naruchitparames and Mehmet Hadi G¨unes, Enhancing Data Privacy and Integrity in the Cloud, 2011
  7. R. Thandeeswaran1, S. Subhashini1, N. Jeyanthi1, M. A. Saleem Durai, Secured Multi-Cloud Virtual Infrastructure with Improved Performance, 2012
  8. Mr. K. Saravanan #1, M. Lakshmi Kantham #2 , An enhanced QoS Architecture based Framework for Ranking of Cloud Services, 2013.
  9. Michael Smit, Mark Shtern, Bradley Simmons, and Marin Litoiu, Enabling an Enhanced Data-as-a-Service Ecosystem, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Multi cloud architectures Security constraints Data Protection model