Call For Papers
Contact Us

  File Management System in Multi Cloud Storage System  
  Authors : Dolly Talware; Ms. Purnima Soni; R. C. Dharmik
  Cite as:


Cloud computing service providers take advantage of virtualization technologies, combined with self-service capabilities, to offer cost-effective access to computing resources via the internet. But major issue in cloud Computing is security. Several concerns which identify security requirements in cloud computing.. In this Paper, We have proposed to implements, the concept of multiple cloud storage along with enhanced security using encryption techniques. Rather than storing complete file on single cloud system. It will split the file in different chunks then encrypt and store them it on different clouds. The Meta data required for decrypting and rearranging a file and it will be stored in metadata management server.


Published In : IJCSN Journal Volume 3, Issue 1

Date of Publication : 01 February 2014

Pages : 132- 135

Figures : 02

Tables : --

Publication Link : IJCSN-2014/3-1/File-Management-System-in-Multi-Cloud-Storage-System




Dolly Talware : Department of Computer Science and Engineering, Nagpur University, G.H. Raisoni Institute of Engineering and Technology for Women, Nagpur-440034, India

Ms. Purnima Soni : Department of Computer Science and Engineering, Nagpur University, G.H. Raisoni Institute of Engineering and Technology for Women, Nagpur-440034, India

R. C. Dharmik : Department of Information Technology, Nagpur University, Yeshwantrao Chavan College of Engineering, Nagpur, India









Security algorithm


A web portal which let the user manage his data and the managed data should be splitter over the multiple cloud drive as a chunk of file along with encryption. Proposed system will be tested and demonstrate over a local network or on live storage cloud server.










[1] J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono, and N. Marnau, “Security and Privacy-Enhancing Multi-cloud Architectures,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 10, NO. 4, JULY/AUGUST 2013.

[2] Kan Yang, Ren, Xiaohua Jia, Bo Zhang, and Ruitao Xie, “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems,” IEEE 2013.

[3] P. Mell and T. Grance, “The NIST de?nition of cloud computing,” National Institute of Standards and Technology, Tech. Rep., Sept 2011.

[4] Jing-Jang Hwang and Hung-Kai Chuang, ” A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service,” National Science Council of Taiwan Government, IEEE ,2012.

[5] J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, “Security Prospects through Cloud Computing by Adopting Multiple Clouds,” Proc. IEEE Fourth Int’l Conf. Cloud Computing (CLOUD), 2011.

[6] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On Technical Security Issues in Cloud Computing,” in Proceeding of IEEE Int’l Conf. Cloud Computing (CLOUD-II), 2009.3.

[7] Kan Yang, Xiaohua Jia, ” Attributed-based Access Control for Multi-Authority Systems in Cloud Storage,” in Proceeding of 2012 32nd IEEE International Conference on Distributed Computing Systems , IEEE ,2012.

[8] M. A. AlZain, B. Soh and E. Pardede,” MCDB: Using Multi-Clouds to Ensure Security in Cloud Computing,” in Proceeding of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing,IEEE,2011.

[9] C. Selvakumar G. Jeeva Rathanam M. R. Sumalatha ,” PDDS - Improving Cloud Data Storage Security Using Data Partitioning Technique,” IEEE,2012.

[10] Akash Kumar Mandal, Mrs Archana Tiwari , ” Performance Evaluation of Cryptographic Algorithms: DES and AES,” inProceeding of 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science,IEEE 2012.

[11] J. D Assistant Professor, Ramkumar P Systems Engineer, Kadhirvelu D,” Preserving Privacy through Data Control in a Cloud Computing Architecture using Discretion Algorithm,” in Proceeding of Third International Conference on Emerging Trends in Engineering and Technology,IEEE,2010.

[12] Prashant Kumar,Lokesh Kumar,” Security Threats to Cloud Computing”, International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), Volume 2, No. 1, December 2013