Designing Multi-Cloud Server for Scalable and Secure Sharing Over Web

Authors

  • Shruti Timande Research Department, Yashika Publications India Author
  • Dharmesh Dhabliya Research Department, Yashika Publications India Author

DOI:

https://doi.org/10.61841/jd2hr745

Keywords:

Cloud Computing, IaaS, Encryption, SaaS, PaaS, Distributed, Security, Split, Merging, Encryption

Abstract

 With the internet getting so popular data sharing and security of personal data has gain much more importance than before. Cloud provides and efficient way to outsource the data either online or offline but data security becomes one of the major issues in unreliable multi-cloud environment. This paper addresses the issues in multi-cloud environment and also provides a way to provide better security in multi-cloud environment. Further it discusses the different encryption algorithms that can be used to maintain a design framework for cloud environment. 

Downloads

Download data is not yet available.

References

1. Cloud Computing Security: From Single To Multi-Clouds Mohammed A. Alzain , Eric Pardede , Ben

Soh , James A. Thom 2012 45th Hawaii International Conference On System Sciences.

2. Ensuring Data Integrity And Security In Cloud Storage Olfa Nasraoui, Member, IEEE, Maha Soliman,

Member, IEEE, Esin Saka, Member, IEEE, Antonio Badia, Member, IEEE, And Richard Germain IEEE

TRANSACTIONS ON CLOUD AND DATA ENGINEERING, VOL. 20, No. 2, February 2013.

3. Reliable Re-Encryption In Unreliable Clouds Qin Liu ,Chiu C.Tan ,Jiewu, And Guojun Wang IEEE

Communications Society Subject Matter Experts For Publication In The IEEE Globecom 2011

Proceedings.

4. Service-Oriented Cloud Computing Architecture Wei-Tek Tsai, Xin Sun, Janaka Balasooriya 2010

Seventh International Conference On Information Technology

5. Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage Cheng-Kang Chu, Sherman S.

M. Chow, Wen-Guey Tzeng, Jianying Zhou, And Robert H. Deng, Senior Member, IEEE, IEEE

Transactions On Parallel And Distributed Systems. Volume: 25, Issue: 2. Year: 2014

6. Mell-Peter, Grance-Timothy. September 2011. The NIST Definition Of Cloud Computing.

7. C. Cachin, I. Keidar And A. Shraer, "Trusting The Cloud", ACM SIGACT News, 40, 2009, Pp. 81-86.

Clavister, "Security in The Cloud", Clavister White Paper, 2008.

8. H.Mei, J. Dawei, L. Guoliang And Z. Yuan, "Supporting Database Applications As A Service",

ICDE'09:Proc. 25thintl.Conf. On Data Engineering, 2009, Pp. 832-843.

9. C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring Data Storage Security In Cloud Computing",

ARTCOM'10: Proc. Intl. Conf. On Advances In Recent Technologies In Communication And

Computing, 2010, Pp. 1-9.

10. Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina And Eduardo B Fernandez An Analysis

Of Security Issues For Cloud Computing Hashizume Et Al. Journal Of Internet Services And

Applications 2013.

11. Gehana Booth, Andrew Soknacki, and Anil Somayaji Cloud Security: Attacks and Current Defenses 8th

ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE (ASIA’13), JUNE 4-5, 2013, ALBANY,

NY.

12. Brent Lagesse Challenges In Securing The Interface Between The Cloud And Pervasive Systems IEEE

Pervasive Computing, Vol. 8, Pp. 14–23, October 2009. [Online].

13. Wayne A. Jansen Cloud Hooks: Security And Privacy Issues In Cloud Computing Proceedings Of The

44th Hawaii International Conference On System Sciences – 2011.

14. Mukesh Singhal And Santosh Chandrasekhar Collaboration In Multicloud Computing Environments:

Framework And Security Issues Published By The IEEE Computer Society 0018-9162/13/$31.00 © 2013

IEEE

15. Sushmita Ruj, Milos Stojmenovic, Amiya Nayak Decentralized Access Control With Anonymous

Authentication Of Data Stored In Clouds IEEE TRANSACTIONS ON PARALLEL AND

DISTRIBUTED SYSTEMS VOL:25 NO:2 YEAR 2014.

16. Lukas Malina and Jan Hajny Efficient Security Solution for Privacy-Preserving Cloud Services 6TH

INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS SIGNAL PROCESSING YEAR

2013

17. Morgan, Lorraine Conboy, Kieran FACTORS AFFECTING THE ADOPTION OF CLOUD

18. COMPUTING: AN EXPLORATORY STUDY Proceedings of the 21st European Conference on

Information Systems 2012

19. Sarita Motghare, P.S.Mohod International Journal of Advanced Research In Computer Science Volume 4,

No. 4, March-April 2013

20. Bryan Ford Icebergs in the Clouds: The Other Risks Of Cloud Computing SIGCOMM, August 2010

21. Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, And Robert H. Deng KeyAggregate Cryptosystem For Scalable Data Sharing In Cloud Storage IEEE Transactions On Parallel And

Distributed Systems. Volume: 25, Issue: 2. Year: 2014.

22. Abhinandan P Shirahatti, P S Khanagoudar Preserving Integrity of Data and Public Auditing For Data

Storage Security In Cloud Computing IMACST: VOLUME 3 NUMBER 3 JUNE 2012

23. Allan A. Friedman and Darrell M. West Privacy and Security in Cloud Computing Number 3 October

2010

24. Mohamed Nabeel, Elisa Bertino Privacy Preserving Delegated Access Control in Public Clouds

PUBLISHING YEAR 2012

25. Myrto Arapinis, Sergiu Bursuc, and Mark Ryan Privacy Supporting Cloud Computing: Confichair, A

Case Study University Of Birmingham Nov. 2012

26. Darko Andročec Research Challenges For Cloud Computing Economics Nov. 2011

27. Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull Security Issues with Possible Solutions In Cloud

Computing-A Survey International Journal Of Advanced Research In Computer Engineering &

Technology (IJARCET) Volume 2, Issue 2, February 2013

28. Romann, M., Javet, M., & Fuchslocher, J. (2017). Coaches' eye as a valid method to assess biological

maturation in youth elite soccer. Talent Development and Excellence, 9(1), 3-13. Retrieved from

www.scopus.com

29. Tarn, C. S. Y., Phillipson, S. N., & Phillipson, S. (2016). "Creativity" reform in hong kong: Validation of

the creative inventions test. Talent Development and Excellence, 8(2), 3-19. Retrieved from

www.scopus.com

30. Lammers, D. (2017). Deep learning could boost yields, increase revenues. Solid State Technology, 60(3),

20-23. Retrieved from www.scopus.com

31. Lammers, D. (2017). SiPs simplify wireless IoT design. Solid State Technology, 60(2), 17-19. Retrieved

from www.scopus.com27

32. Song, C., & Shimamoto, S. (2018). A study on realization of combined amplitude and phase modulation

employing elliptical signals. International Journal of Advanced Science and Technology, 24, 43-68.

Retrieved from www.scopus.com

33. Toptsis, A. A. (2017). Reflective thinking, machine learning, and user authentication via artificial K-lines.

International Journal of Advanced Science and Technology, 23, 51-74. Retrieved from www.scopus.com

34. Toptsis, A. A., Chaturvedi, R. A., & Feroze, A. (2017). Kohonen-guided parallel bidirectional voronoiassisted heuristic search. International Journal of Advanced Science and Technology, 23, 15-34.

Retrieved from www.scopus.com

Downloads

Published

07.04.2025

How to Cite

Timande, S., & Dhabliya, D. (2025). Designing Multi-Cloud Server for Scalable and Secure Sharing Over Web. International Journal of Psychosocial Rehabilitation, 23(5), 835-841. https://doi.org/10.61841/jd2hr745