Online Submission!

Open Journal Systems

ENHANCING THE CLOUD SECURITY BY USING IDENTITY BASED MULTICLOUD ARCHITECTURE

Rutuja G. Warhade, Basha Vankudothu

Abstract


In today’s IT world Cloud computing is emerging as a most powerful technology. Cloud provides the user with the resources on a pay-as-you go basis, which fulfils the demand of most of the industries. Security challenges are the biggest obstacles in adopting cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues the cloud paradigm comes with a new set of unique features, which open the path towards novel security approaches, techniques and architectures. This paper provides a scheme to enhance the security of stored data in the cloud by using multiple clouds and identity verification of the user.

Full Text:

PDF

References


J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono, and N. Marnau,

“Security and Privacy-Enhancing Multi-cloud Architectures,” IEEE

TRANSACTIONS ON DEPENDABLE AND SECURE

COMPUTING, VOL. 10, NO. 4, JULY/AUGUST 2013

Kan Yang, Ren, Xiaohua Jia, Bo Zhang, and Ruitao Xie, “DACMACS:

Effective Data Access Control for Multi-Authority Cloud

Storage Systems,” IEEE 2013

P. Mell and T. Grance, “The NIST definition of cloud computing,”

National Institute of Standards and Technology, Tech. Rep., Sept

Jing-Jang Hwang and Hung-Kai Chuang, ” A Business Model for

Cloud Computing Based on a Separate Encryption and Decryption

Service,” National Science Council of Taiwan Government, IEEE

,2012

J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L.

Iacono, “Security Prospects through Cloud Computing by Adopting

Multiple Clouds,” Proc. IEEE Fourth Int’l Conf. Cloud Computing

(CLOUD), 2011.

M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On

Technical Security Issues in Cloud Computing,” in Proceeding of

IEEE Int’l Conf. Cloud Computing (CLOUD-II), 2009.

Kan Yang, Xiaohua Jia, ” Attributed-based Access Control for

Multi-Authority Systems in Cloud Storage,” in Proceeding of 2012

nd IEEE International Conference on Distributed Computing

Systems , IEEE ,2012.

Prashant Kumar,Lokesh Kumar,” Security Threats to Cloud

Computing”, International Journal of IT, Engineering and Applied

Sciences Research (IJIEASR), Volume 2, No. 1, December 2013




DOI: http://dx.doi.org/10.6084/ijact.v4i7.23

Refbacks

  • There are currently no refbacks.




Copyright (c) 2015 COMPUSOFT "An International Journal of Advanced Computer Technology"