CFP last date
22 April 2024
Reseach Article

Security Approach for Multi-Cloud Data Storage

by Mandar Kadam, Stewyn Chaudhary, Bony Carvalho
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 4
Year of Publication: 2015
Authors: Mandar Kadam, Stewyn Chaudhary, Bony Carvalho
10.5120/ijca2015906032

Mandar Kadam, Stewyn Chaudhary, Bony Carvalho . Security Approach for Multi-Cloud Data Storage. International Journal of Computer Applications. 126, 4 ( September 2015), 27-31. DOI=10.5120/ijca2015906032

@article{ 10.5120/ijca2015906032,
author = { Mandar Kadam, Stewyn Chaudhary, Bony Carvalho },
title = { Security Approach for Multi-Cloud Data Storage },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 4 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number4/22540-2015906032/ },
doi = { 10.5120/ijca2015906032 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:34.748616+05:30
%A Mandar Kadam
%A Stewyn Chaudhary
%A Bony Carvalho
%T Security Approach for Multi-Cloud Data Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 4
%P 27-31
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In many organizations, transformation of information and storage of sensitive data has highest priority. Client data should be kept secret as well as inaccessible from all other unauthorized hacks [1]. To maintain the security of the user data, cloud computing environment has practiced. The cloud computing is a cost-effective, service availability, flexible and on demand service delivery platform for providing business through the internet [2]. However, as the security of a single cloud is concerned, it fails to provide a strong protection layer against the malicious attacks. So, there is always a risk of data unavailability in system failure. A movement towards of “multi clouds” or “multiple clouds‟ or “cloud-of-clouds” has emerged currently using Shamir’s Secret Sharing Algorithm [3]. Here, the implementation of Shamir’s secret sharing algorithm is performed to authenticate a unique user and to access a particular file from the cloud storage.

References
  1. Mohammed A. AlZain, Ben Soh, Eric Pardede, “A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds”, Journal of Software, Vol 8, No 5 (2013), 1068-1078, May 2013
  2. Hassan Takabi, James B.D., Joshi, Gail-Joon, Ahn, “Security and Privacy Challenges in Cloud Computing Environments”, University of Pittsberg, October 2010.
  3. Md Kausar Alam, Sharmila Banu K, “An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds”, International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013
  4. Mohammed A. AlZain, Ben Soh and Eric Pardede, “Cloud computing security: from single to multi-clouds”, 2012, 45th Hawaii international conference on system sciences.
  5. Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando Andre, Paulo Sousa, “DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds”, University of Lisbon, Faculty of Sciences, Portugal.
  6. S. Subashini, V.Kavitha, “A surveys on security and privacy issues in service delivery models of the cloud computing”, journal of networks and computer applications, 34 (1), 2011, pp1-11.
  7. Shamir, Adi (1979), "How to share a secret", Communications of the ACM 22 (11): 612–613
  8. Review of methods for secret sharing in cloud Computing- “International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)”, Volume 2, Issue 1, January 2013
Index Terms

Computer Science
Information Sciences

Keywords

Shamir’s Secret Sharing Algorithm Data Security Cloud Storage Single Cloud Multi Clouds Authentication.