Cloud computing obtaining huge attention due
to its characteristics and services provided by it as Software,
Platform and infrastructure as service. Nowadays cloud
computing became as a popular paradigm that offers
computing resources as scalable and on-demand, on fly
collaboration, resource sharing services over the Internet on
the basis of pay per use. With single cloud user gets vendor
lock-in and use all services from single cloud in which data
confidentiality is still immature. The user can gain services
from single cloud provider there is risk of data theft, failure
and service availability problems. This problem can be
addressed by moving from single to multiple cloud thus
having more options that can reduce risk and improve
availability of service and increase complexity of data
availability. Mash-up will be driven by the growing need to
offer diverse services without having to spend heavily on
infrastructure. In this paper we propose novel architecture
of multiple cloud computing mash-up, executing concurrent
operations on encrypted data for security purpose and end
to end data protection by generating secrete key. We have
developed a proof of concept of our framework using java
and deployed it on a RH cloud.
Cloud computing technology has grown to the extent
where users can store their confidential data in multiple
cloud storage. The multiple cloud environment can
finished the vendor lock-in of the consumer which is
attained in the single cloud. The profit of this kind of
Framework include high service availability, low security
risks and the insider theft is eliminated to a greater extent.
In this paper, we proposed a secure multiple cloud
computing mash-up which facilitates collaboration
between clouds and gives the admin has opportunity to
download the files from different cloud and allow user to
download the file which is present. Future scope of this
framework is backup for maintaining the data.
[1] R. Thandeeswaran, S. Subhashini, N. Jeyanthi1, M. A.
Saleem Durai, “Secured Multi-Cloud Virtual
Infrastructure with Improved Performance”,
cybernetics and information technologies XII, ( 2), pp.
11-22, 2012
[2] Mukesh Singhal and Santosh Chandrasekhar, Tingjian
Ge, Ravi Sandhu and Ram Krishnan, Gail-Joon Ahn,
and Elisa Bertino “Collaboration in Multicloud
Computing Environments: Framework and Security
Issues”, Published by the IEEE Computer Society
IEEE, 2013.
[3] Ayad Barsoum and Anwar Hasan, “Enabling Dynamic
Data and Indirect Mutual Trust for Cloud Computing
Storage Systems”, IEEE transactions on parallel and
distributed systems [4] K.D. Bowers, A. Juels and A. Oprea, "HAIL:
Ahighavailability and integrity layer for cloudstorage",
CCS'09: Proc. 16th ACM Conf. onComputer and
communications security, 2009, pp.187-198.
[5] C. Cachin, I. Keidar and A. Shraer, "Trusting
thecloud", ACM SIGACT News, 40, 2009, pp. 81-86.
[6] A. Gouglidis, I. Mavridis, and V. C. Hu, “Security
policy verification for multi-domains in cloud
systems,” International Journal of Information
Security, vol. 13, no. 2, pp. 97–111, 2014.
[7] H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Securityand
Privacy Challenges in Cloud
ComputingEnvironments", IEEE Security & Privacy,
8(6), 2010, pp. 24-31.
[8] S. Subashini and V. Kavitha, "A survey on
securityissues in service delivery models of
cloudcomputing", Journal of Network and
ComputerApplications, 34(1), 2011, pp 1-11.
[9] A. Bessani, M. Correia, B. Quaresma, F. André andP.
Sousa, "DepSky: dependable and secure storagein a
cloud-of-clouds", EuroSys'11:Proc. 6thConf.
OnComputer systems, 2011, pp. 31-46.
[10] F. Rocha and M. Correia, "Lucy in the Sky
withoutDiamonds: Stealing Confidential Data in
theCloud", Proc. 1stIntl. Workshop of Dependabilityof
Clouds, Data Centers and Virtual
ComputingEnvironments, 2011, pp. 1-6.
[11] H. Abu-Libdeh, L. Princehouse and H.Weatherspoon,
"RACS: a case for cloud storage diversity",
SoCC'10:Proc. 1st ACM symposium onCloud
computing, 2010, pp. 229-240.
[12] C. Cachin, R. Haas and M. Vukolic,
"Dependablestorage in the Intercloud", Research
Report RZ,3783, 2010.
[13] A.J. Feldman, W.P. Zeller, M.J. Freedman andE.W.
Felten, "SPORC: Group collaboration usinguntrusted
cloud resources", OSDI, October2010, pp. 1-14.
[14] E. Grosse, J. Howie, J. Ransome, J. Reavis and
S.Schmidt, "Cloud computing roundtable",
EEESecurity & Privacy, 8(6),2010, pp. 17-23.
[15] S. Kamara and K. Lauter, "Cryptographic
cloudstorage", FC'10: Proc. 14thIntl.Conf. on
inancialcryptograpy and data security,2010, pp. 136-
149.
[16] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M.
Dahlin and M. Walfish, "Depot: Cloud storagewith
minimal trust", OSDI'10: Proc. of the 9thUSENIX
Conf. on Operating systems design
andimplementation, 2010, pp. 1-16.
[17] A. Shraer, C. Cachin, A. Cidon, I. Keidar,
Y.Michalevsky and D. Shaket, "Venus: Verificationfor
untrusted cloud storage", CCSW'10: Proc.ACM
workshop on Cloud computing securityworkshop,
2010, pp. 19-30.