ENHANCING THE CLOUD SECURITY BY USING IDENTITY BASED MULTICLOUD ARCHITECTURE
AbstractIn todayâ€™s IT world Cloud computing is emerging as a most powerful technology. Cloud provides the user with the resources on a pay-as-you go basis, which fulfils the demand of most of the industries. Security challenges are the biggest obstacles in adopting cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues the cloud paradigm comes with a new set of unique features, which open the path towards novel security approaches, techniques and architectures. This paper provides a scheme to enhance the security of stored data in the cloud by using multiple clouds and identity verification of the user.
J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono, and N. Marnau,
â€œSecurity and Privacy-Enhancing Multi-cloud Architectures,â€ IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 10, NO. 4, JULY/AUGUST 2013
Kan Yang, Ren, Xiaohua Jia, Bo Zhang, and Ruitao Xie, â€œDACMACS:
Effective Data Access Control for Multi-Authority Cloud
Storage Systems,â€ IEEE 2013
P. Mell and T. Grance, â€œThe NIST definition of cloud computing,â€
National Institute of Standards and Technology, Tech. Rep., Sept
Jing-Jang Hwang and Hung-Kai Chuang, â€ A Business Model for
Cloud Computing Based on a Separate Encryption and Decryption
Service,â€ National Science Council of Taiwan Government, IEEE
J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L.
Iacono, â€œSecurity Prospects through Cloud Computing by Adopting
Multiple Clouds,â€ Proc. IEEE Fourth Intâ€™l Conf. Cloud Computing
M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, â€œOn
Technical Security Issues in Cloud Computing,â€ in Proceeding of
IEEE Intâ€™l Conf. Cloud Computing (CLOUD-II), 2009.
Kan Yang, Xiaohua Jia, â€ Attributed-based Access Control for
Multi-Authority Systems in Cloud Storage,â€ in Proceeding of 2012
nd IEEE International Conference on Distributed Computing
Systems , IEEE ,2012.
Prashant Kumar,Lokesh Kumar,â€ Security Threats to Cloud
Computingâ€, International Journal of IT, Engineering and Applied
Sciences Research (IJIEASR), Volume 2, No. 1, December 2013
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.