CFP last date
20 December 2024
Reseach Article

Use Of Cryptography and Secrete Sharing Riven the Secrete Into Multi-Cloud

Published on June 2016 by Jivan Pandurang Parihar, Nlam Dilip Acharya, Vrushali Vyanktesh Kulkarni, Poonamdhamal
National Conference on Advances in Computing, Communication and Networking
Foundation of Computer Science USA
ACCNET2016 - Number 2
June 2016
Authors: Jivan Pandurang Parihar, Nlam Dilip Acharya, Vrushali Vyanktesh Kulkarni, Poonamdhamal
3c3d7f07-a814-45f2-a3fd-6c32c8b9b919

Jivan Pandurang Parihar, Nlam Dilip Acharya, Vrushali Vyanktesh Kulkarni, Poonamdhamal . Use Of Cryptography and Secrete Sharing Riven the Secrete Into Multi-Cloud. National Conference on Advances in Computing, Communication and Networking. ACCNET2016, 2 (June 2016), 1-4.

@article{
author = { Jivan Pandurang Parihar, Nlam Dilip Acharya, Vrushali Vyanktesh Kulkarni, Poonamdhamal },
title = { Use Of Cryptography and Secrete Sharing Riven the Secrete Into Multi-Cloud },
journal = { National Conference on Advances in Computing, Communication and Networking },
issue_date = { June 2016 },
volume = { ACCNET2016 },
number = { 2 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/accnet2016/number2/24974-2262/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing, Communication and Networking
%A Jivan Pandurang Parihar
%A Nlam Dilip Acharya
%A Vrushali Vyanktesh Kulkarni
%A Poonamdhamal
%T Use Of Cryptography and Secrete Sharing Riven the Secrete Into Multi-Cloud
%J National Conference on Advances in Computing, Communication and Networking
%@ 0975-8887
%V ACCNET2016
%N 2
%P 1-4
%D 2016
%I International Journal of Computer Applications
Abstract

Cloud computing is one of the rising topic in the field of information technology. Now a day many organizations use this technology. There are many benefits of Cloud computing in terms of low cost and accessibility of Data. It is the smart technology and very popular, among all other computing paradigm. Security of cloud computing is a major factor in the cloud computing environment. Users store sensitive information with cloud storage providers but these providers may be untrusted. Due to risks of service availability failure and the possibility of malicious insiders in the single cloud Single Cloud is less popular. Security is one of the major factor that affect the growth as well as the development of cloud computing. This paper aims at the service availability of cloud. In this paper we give the solution for the cloud availability.

References
  1. S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications (2011), pp-1-11.
  2. Z. Xiao and Y. Xiao, "Security and Privacy in Cloud Computing, Communication Survey & Tutorials", IEEE, vol. 15, 2013, pp. 843-859.
  3. A. Juels and B. S. Kaliski, Jr. , "Pors: proofs of retrievability for large files," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security.
  4. Amazon, Amazon Web Services. Web services licensing agreement, October3, 2006.
  5. S. L. Garfinkel, "An evaluation of amazon's grid computing services: EC2, S3, and SQS", Technical Report TR-08-07, Computer Science Group, Harvard University, Citeseer, 2007, pp. 1-15.
  6. Peeyush Mathur, Nikhil Nishchal, "Cloud Computing: New challenge to the entire computer industry", 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  7. E. B. FERNANDEZ 2013a. Security patterns in practice – Designing secure architectures using software patterns. Wiley Series on Software Design Patterns, 2013.
  8. Nine top threats to cloud computing security, http://www. infoworld. com/t/cloud-security, July 2013.
  9. Using Multi Shares for Ensuring Privacy in Database-asa-Service",44th Hawaii Intl Conf. on System Science (HICSS),2011,pp. 1-9. M. A. AlZin and E. Parded.
  10. A. Shamir,"How to share a secret",Communication of the ACM,22(11),1979,pp. 612-613
  11. M. Vukolic,"The Byzantine empire in the intercloud",ACM SIGACT News,41,2010,pp. 105-111
  12. A. Bessani,M. Correia,B. Ouaresma,F. Andre and P. Sousa,"Depskay:dependable and secure storage in a cloud-of-clouds",EuroSys'11:Proc. 6th Conf. on Computer System,2011,pp. 31-46
  13. Xu Xiaoping ,Yan Junhu Research on cloud computing Security Platform ,2012 Forth International Conference on Computational and Information Science
  14. K. Birman,G. Chockler and R. van Reesse,"Toward a cloud computing research agenda",SIGACT News,40,2001,pp. 68-80.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Single Cloud Multi-clouds Cloud Storage Depsky System Shamir Secrete Sharing Algorithm Data Transfer Security