Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Mash-Up in Multiple Cloud Computing With Security  
  Authors : Mrunali Khedikar; Sulbha Patil; Rajiv Dharasakar
  Cite as:

 

Cloud computing obtaining huge attention due to its characteristics and services provided by it as Software, Platform and infrastructure as service. Nowadays cloud computing became as a popular paradigm that offers computing resources as scalable and on-demand, on fly collaboration, resource sharing services over the Internet on the basis of pay per use. With single cloud user gets vendor lock-in and use all services from single cloud in which data confidentiality is still immature. The user can gain services from single cloud provider there is risk of data theft, failure and service availability problems. This problem can be addressed by moving from single to multiple cloud thus having more options that can reduce risk and improve availability of service and increase complexity of data availability. Mash-up will be driven by the growing need to offer diverse services without having to spend heavily on infrastructure. In this paper we propose novel architecture of multiple cloud computing mash-up, executing concurrent operations on encrypted data for security purpose and end to end data protection by generating secrete key. We have developed a proof of concept of our framework using java and deployed it on a RH cloud.

 

Published In : IJCSN Journal Volume 5, Issue 3

Date of Publication : June 2016

Pages : 483-488

Figures :05

Tables : --

Publication Link : Mash-Up in Multiple Cloud Computing With Security

 

 

 

Mrunali Khedikar : Computer Science and engineering, RTMNU, TGPCET Nagpur, Maharashtra, India

Sulbha Patil : Computer Science and engineering, RTMNU, TGPCET Nagpur, Maharashtra, India

Rajiv Dharasakar : Computer Science and engineering, RTMNU, TGPCET Nagpur, Maharashtra, India

 

 

 

 

 

 

 

Mash-Up, Security, Multiple Cloud, File Upload, File Download

Cloud computing technology has grown to the extent where users can store their confidential data in multiple cloud storage. The multiple cloud environment can finished the vendor lock-in of the consumer which is attained in the single cloud. The profit of this kind of Framework include high service availability, low security risks and the insider theft is eliminated to a greater extent. In this paper, we proposed a secure multiple cloud computing mash-up which facilitates collaboration between clouds and gives the admin has opportunity to download the files from different cloud and allow user to download the file which is present. Future scope of this framework is backup for maintaining the data.

 

 

 

 

 

 

 

 

 

[1] R. Thandeeswaran, S. Subhashini, N. Jeyanthi1, M. A. Saleem Durai, “Secured Multi-Cloud Virtual Infrastructure with Improved Performance”, cybernetics and information technologies XII, ( 2), pp. 11-22, 2012 [2] Mukesh Singhal and Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu and Ram Krishnan, Gail-Joon Ahn, and Elisa Bertino “Collaboration in Multicloud Computing Environments: Framework and Security Issues”, Published by the IEEE Computer Society IEEE, 2013. [3] Ayad Barsoum and Anwar Hasan, “Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems”, IEEE transactions on parallel and distributed systems [4] K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahighavailability and integrity layer for cloudstorage", CCS'09: Proc. 16th ACM Conf. onComputer and communications security, 2009, pp.187-198. [5] C. Cachin, I. Keidar and A. Shraer, "Trusting thecloud", ACM SIGACT News, 40, 2009, pp. 81-86. [6] A. Gouglidis, I. Mavridis, and V. C. Hu, “Security policy verification for multi-domains in cloud systems,” International Journal of Information Security, vol. 13, no. 2, pp. 97–111, 2014. [7] H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Securityand Privacy Challenges in Cloud ComputingEnvironments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31. [8] S. Subashini and V. Kavitha, "A survey on securityissues in service delivery models of cloudcomputing", Journal of Network and ComputerApplications, 34(1), 2011, pp 1-11. [9] A. Bessani, M. Correia, B. Quaresma, F. André andP. Sousa, "DepSky: dependable and secure storagein a cloud-of-clouds", EuroSys'11:Proc. 6thConf. OnComputer systems, 2011, pp. 31-46. [10] F. Rocha and M. Correia, "Lucy in the Sky withoutDiamonds: Stealing Confidential Data in theCloud", Proc. 1stIntl. Workshop of Dependabilityof Clouds, Data Centers and Virtual ComputingEnvironments, 2011, pp. 1-6. [11] H. Abu-Libdeh, L. Princehouse and H.Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium onCloud computing, 2010, pp. 229-240. [12] C. Cachin, R. Haas and M. Vukolic, "Dependablestorage in the Intercloud", Research Report RZ,3783, 2010. [13] A.J. Feldman, W.P. Zeller, M.J. Freedman andE.W. Felten, "SPORC: Group collaboration usinguntrusted cloud resources", OSDI, October2010, pp. 1-14. [14] E. Grosse, J. Howie, J. Ransome, J. Reavis and S.Schmidt, "Cloud computing roundtable", EEESecurity & Privacy, 8(6),2010, pp. 17-23. [15] S. Kamara and K. Lauter, "Cryptographic cloudstorage", FC'10: Proc. 14thIntl.Conf. on inancialcryptograpy and data security,2010, pp. 136- 149. [16] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M. Dahlin and M. Walfish, "Depot: Cloud storagewith minimal trust", OSDI'10: Proc. of the 9thUSENIX Conf. on Operating systems design andimplementation, 2010, pp. 1-16. [17] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.Michalevsky and D. Shaket, "Venus: Verificationfor untrusted cloud storage", CCSW'10: Proc.ACM workshop on Cloud computing securityworkshop, 2010, pp. 19-30.