Designing Multi-Cloud Server for Scalable and Secure Sharing Over Web
DOI:
https://doi.org/10.61841/jd2hr745Keywords:
Cloud Computing, IaaS, Encryption, SaaS, PaaS, Distributed, Security, Split, Merging, EncryptionAbstract
With the internet getting so popular data sharing and security of personal data has gain much more importance than before. Cloud provides and efficient way to outsource the data either online or offline but data security becomes one of the major issues in unreliable multi-cloud environment. This paper addresses the issues in multi-cloud environment and also provides a way to provide better security in multi-cloud environment. Further it discusses the different encryption algorithms that can be used to maintain a design framework for cloud environment.
Downloads
References
1. Cloud Computing Security: From Single To Multi-Clouds Mohammed A. Alzain , Eric Pardede , Ben
Soh , James A. Thom 2012 45th Hawaii International Conference On System Sciences.
2. Ensuring Data Integrity And Security In Cloud Storage Olfa Nasraoui, Member, IEEE, Maha Soliman,
Member, IEEE, Esin Saka, Member, IEEE, Antonio Badia, Member, IEEE, And Richard Germain IEEE
TRANSACTIONS ON CLOUD AND DATA ENGINEERING, VOL. 20, No. 2, February 2013.
3. Reliable Re-Encryption In Unreliable Clouds Qin Liu ,Chiu C.Tan ,Jiewu, And Guojun Wang IEEE
Communications Society Subject Matter Experts For Publication In The IEEE Globecom 2011
Proceedings.
4. Service-Oriented Cloud Computing Architecture Wei-Tek Tsai, Xin Sun, Janaka Balasooriya 2010
Seventh International Conference On Information Technology
5. Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage Cheng-Kang Chu, Sherman S.
M. Chow, Wen-Guey Tzeng, Jianying Zhou, And Robert H. Deng, Senior Member, IEEE, IEEE
Transactions On Parallel And Distributed Systems. Volume: 25, Issue: 2. Year: 2014
6. Mell-Peter, Grance-Timothy. September 2011. The NIST Definition Of Cloud Computing.
7. C. Cachin, I. Keidar And A. Shraer, "Trusting The Cloud", ACM SIGACT News, 40, 2009, Pp. 81-86.
Clavister, "Security in The Cloud", Clavister White Paper, 2008.
8. H.Mei, J. Dawei, L. Guoliang And Z. Yuan, "Supporting Database Applications As A Service",
ICDE'09:Proc. 25thintl.Conf. On Data Engineering, 2009, Pp. 832-843.
9. C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring Data Storage Security In Cloud Computing",
ARTCOM'10: Proc. Intl. Conf. On Advances In Recent Technologies In Communication And
Computing, 2010, Pp. 1-9.
10. Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina And Eduardo B Fernandez An Analysis
Of Security Issues For Cloud Computing Hashizume Et Al. Journal Of Internet Services And
Applications 2013.
11. Gehana Booth, Andrew Soknacki, and Anil Somayaji Cloud Security: Attacks and Current Defenses 8th
ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE (ASIA’13), JUNE 4-5, 2013, ALBANY,
NY.
12. Brent Lagesse Challenges In Securing The Interface Between The Cloud And Pervasive Systems IEEE
Pervasive Computing, Vol. 8, Pp. 14–23, October 2009. [Online].
13. Wayne A. Jansen Cloud Hooks: Security And Privacy Issues In Cloud Computing Proceedings Of The
44th Hawaii International Conference On System Sciences – 2011.
14. Mukesh Singhal And Santosh Chandrasekhar Collaboration In Multicloud Computing Environments:
Framework And Security Issues Published By The IEEE Computer Society 0018-9162/13/$31.00 © 2013
IEEE
15. Sushmita Ruj, Milos Stojmenovic, Amiya Nayak Decentralized Access Control With Anonymous
Authentication Of Data Stored In Clouds IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS VOL:25 NO:2 YEAR 2014.
16. Lukas Malina and Jan Hajny Efficient Security Solution for Privacy-Preserving Cloud Services 6TH
INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS SIGNAL PROCESSING YEAR
2013
17. Morgan, Lorraine Conboy, Kieran FACTORS AFFECTING THE ADOPTION OF CLOUD
18. COMPUTING: AN EXPLORATORY STUDY Proceedings of the 21st European Conference on
Information Systems 2012
19. Sarita Motghare, P.S.Mohod International Journal of Advanced Research In Computer Science Volume 4,
No. 4, March-April 2013
20. Bryan Ford Icebergs in the Clouds: The Other Risks Of Cloud Computing SIGCOMM, August 2010
21. Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, And Robert H. Deng KeyAggregate Cryptosystem For Scalable Data Sharing In Cloud Storage IEEE Transactions On Parallel And
Distributed Systems. Volume: 25, Issue: 2. Year: 2014.
22. Abhinandan P Shirahatti, P S Khanagoudar Preserving Integrity of Data and Public Auditing For Data
Storage Security In Cloud Computing IMACST: VOLUME 3 NUMBER 3 JUNE 2012
23. Allan A. Friedman and Darrell M. West Privacy and Security in Cloud Computing Number 3 October
2010
24. Mohamed Nabeel, Elisa Bertino Privacy Preserving Delegated Access Control in Public Clouds
PUBLISHING YEAR 2012
25. Myrto Arapinis, Sergiu Bursuc, and Mark Ryan Privacy Supporting Cloud Computing: Confichair, A
Case Study University Of Birmingham Nov. 2012
26. Darko Andročec Research Challenges For Cloud Computing Economics Nov. 2011
27. Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull Security Issues with Possible Solutions In Cloud
Computing-A Survey International Journal Of Advanced Research In Computer Engineering &
Technology (IJARCET) Volume 2, Issue 2, February 2013
28. Romann, M., Javet, M., & Fuchslocher, J. (2017). Coaches' eye as a valid method to assess biological
maturation in youth elite soccer. Talent Development and Excellence, 9(1), 3-13. Retrieved from
www.scopus.com
29. Tarn, C. S. Y., Phillipson, S. N., & Phillipson, S. (2016). "Creativity" reform in hong kong: Validation of
the creative inventions test. Talent Development and Excellence, 8(2), 3-19. Retrieved from
www.scopus.com
30. Lammers, D. (2017). Deep learning could boost yields, increase revenues. Solid State Technology, 60(3),
20-23. Retrieved from www.scopus.com
31. Lammers, D. (2017). SiPs simplify wireless IoT design. Solid State Technology, 60(2), 17-19. Retrieved
from www.scopus.com27
32. Song, C., & Shimamoto, S. (2018). A study on realization of combined amplitude and phase modulation
employing elliptical signals. International Journal of Advanced Science and Technology, 24, 43-68.
Retrieved from www.scopus.com
33. Toptsis, A. A. (2017). Reflective thinking, machine learning, and user authentication via artificial K-lines.
International Journal of Advanced Science and Technology, 23, 51-74. Retrieved from www.scopus.com
34. Toptsis, A. A., Chaturvedi, R. A., & Feroze, A. (2017). Kohonen-guided parallel bidirectional voronoiassisted heuristic search. International Journal of Advanced Science and Technology, 23, 15-34.
Retrieved from www.scopus.com
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.