Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Scalable and Secure Multi Cloud Architecture for IaaS to Address the Performance Issues

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 105 - Number 16
Year of Publication: 2014
M. Sharon Evangeline
Aluri Sai Prasad

M.sharon Evangeline and Aluri Sai Prasad. Article: Scalable and Secure Multi Cloud Architecture for IaaS to Address the Performance Issues. International Journal of Computer Applications 105(16):1-4, November 2014. Full text available. BibTeX

	author = {M.sharon Evangeline and Aluri Sai Prasad},
	title = {Article: Scalable and Secure Multi Cloud Architecture for IaaS to Address the Performance Issues},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {105},
	number = {16},
	pages = {1-4},
	month = {November},
	note = {Full text available}


Security is an important concern to improve in emerging cloud computing to store, manage, analyze and share the sensitive data. Infrastructure as a Service (IaaS) is a provision cloud model attracting all business customers to use cloud by offering on-demand and pay-per-use hardware, storage, servers and other networking components. Present single cloud architectures are having numerous security problems like centralized data management, untrusted service providers, Honest-but-Curious cloud management etc. Multi cloud architecture was introduced recently to improve the efficiency at architecture level and to assure the sensitive data security to data owner. Recent researches were concentrated only to implement generic multi cloud architecture, which causes to raise the load balancing, elasticity and availability issues in multi cloud environment of IaaS. In this paper we introduced scalable and secure multi cloud architecture for IaaS model. This architecture addressed all issues of generic multi cloud architecture and proves that, it is most suitable one for IaaS model management.


  • J. -M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L. L. L. Iacono, "Security Prospects through Cloud Computing by Adopting Multiple Clouds,"Proc. IEEE Fourth Int'l Conf. Cloud Computing (CLOUD),2011.
  • C ANETTI, R. Universally composable security: A new paradigm for cryptographic protocols. In IEEE Symposium on Foundations of Computer Science (FOCS) (2001).
  • A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to enhance cloud architectures to enable cross-federation," in 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD). Los Alamitos, CA, USA: IEEE Computer Society, 2010, pp. 337–345.
  • Amazon Web Services, "Amazon Elastic Compute Cloud (Amazon EC2). " [Online]. Available: http://aws. amazon. com/ec2/.
  • M. v. Dijk and A. Juels. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Hot topics in Security (HotSec'10), pages 1–8. USENIX Association, 2010.
  • N. Santos, K. P. Gummadi, and R. Rodrigues. Towards trusted cloud computing. In Hot Topics in Cloud Computing (HotCloud'09). USENIX Association, 2009.
  • http://searchdatacenter. techtarget. com/definition/green-computing
  • D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, "Blueprint for the Intercloud rotocols and Formats for Cloud Computing Interoperability,"Proc. Int'l Conf. Internet and Web Applications and Services,pp. 328-336, 2009.
  • A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to EnhanceCloud Architectures to Enable Cross-Federation,"Proc. IEEE Third Int'l Conf. Cloud Computing (CLOUD),pp. 337-345, 2010.
  • Atsuo Inomata, TaikiMorikawa, Minoru Ikebe, Sk. Md. MizanurRahman: Proposal and Evaluation of Dynamin Resource Allocation Method Based on the Load Of VMs on IaaS(IEEE,2010),978-1-4244-8704-2/11.
  • R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon,R. Masuoka, and J. Molina, "Controlling data in the cloud:outsourcing computation without outsourcing control," in Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85–90, ACM, 2009.
  • F. Raimondi, J. Skene, and W. Emmerich, "Efficient Online Monitoring of Web-Service SLAs," Proc. 16th ACM SIGSOFT Int'l Symp. Foundations of Software Eng. , pp. 170-180, 2008.
  • P. Padala, K. -Y. Hou, K. G. Shin, X. Zhu, M. Uysal, Z. Wang, S. Singhal, and A. Merchant, "Automated control of multiple virtualized resources," in Proc. of the ACM European conference on Computer systems (EuroSys'09), 2009.