Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 1
Year of Publication: 2014
Authors:
Vidya Ch
N. Chandra Sekhar Reddy
G. Praveen Babu
10.5120/16760-6315

Vidya Ch, Chandra Sekhar N Reddy and Praveen G Babu. Article: Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework. International Journal of Computer Applications 96(1):28-31, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Vidya Ch and N. Chandra Sekhar Reddy and G. Praveen Babu},
	title = {Article: Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {1},
	pages = {28-31},
	month = {June},
	note = {Full text available}
}

Abstract

Cloud Computing is the rising generation key platform for sharing the resources like software as a service, infrastructure as a service, and platform as a service. In future all IT enterprises migrate into cloud platform. Cloud server exchanges the messages for remote location users with the help of multi cloud architectures. Security issues are generated in data transmission. Day by day new vulnerabilities are discovered in cloud computing. Previous cloud development provides the security in limited dimensions with the help of application logic. It not sufficient for control the all different attackers. This is not efficient and scalable environment. It's not optimal approach [1]. Increase the range of cloud computing security and detect the attacks in deep degree manner. It provides highly safe results with good data protection. Here we concentrate on two dimensions. Those dimensions are application logic view and regulatory framework. Its have excellent security properties. This approach provides the excellent security compare to previous approaches. We proved different properties like good integrity and confidentiality compare to previous approaches [1][2].

References

  • Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, and Ninja Marnau, Security and Privacy-Enhancing Multi cloud Architectures, 2013
  • Sven Bugiel, Stefan Nurnberger, Ahmad-Reza Sadeghi, Thomas Schneider ,Twin Clouds: Secure Cloud Computing with Low Latency, 2009
  • Meiko Jensen, J¨org Schwenk, Jens-Matthias Bohli, Nils Gruschka, Luigi LoIacono Security Prospects through Cloud Computing by Adopting Multiple Clouds, 2011
  • Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina ,Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, 2009
  • Hassan Takabi and James B. D. Joshi, Gail-JoonAhn Security and Privacy Challenges in loud Computing Environments, 2010
  • Jeff Naruchitparames and Mehmet Hadi G¨unes, Enhancing Data Privacy and Integrity in the Cloud, 2011
  • R. Thandeeswaran1, S. Subhashini1, N. Jeyanthi1, M. A. Saleem Durai, Secured Multi-Cloud Virtual Infrastructure with Improved Performance, 2012
  • Mr. K. Saravanan #1, M. Lakshmi Kantham #2 , An enhanced QoS Architecture based Framework for Ranking of Cloud Services, 2013.
  • Michael Smit, Mark Shtern, Bradley Simmons, and Marin Litoiu, Enabling an Enhanced Data-as-a-Service Ecosystem, 2011