CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

Data Security in Multi-cloud Environment � A Survey

Published on September 2015 by Vaishali Tupe, Vidyullata Devmane
International Conference and Workshop on Communication, Computing and Virtualization
Foundation of Computer Science USA
ICWCCV2015 - Number 1
September 2015
Authors: Vaishali Tupe, Vidyullata Devmane
9f4cfb74-9157-45c2-ad82-3afc15d64316

Vaishali Tupe, Vidyullata Devmane . Data Security in Multi-cloud Environment � A Survey. International Conference and Workshop on Communication, Computing and Virtualization. ICWCCV2015, 1 (September 2015), 0-0.

@article{
author = { Vaishali Tupe, Vidyullata Devmane },
title = { Data Security in Multi-cloud Environment � A Survey },
journal = { International Conference and Workshop on Communication, Computing and Virtualization },
issue_date = { September 2015 },
volume = { ICWCCV2015 },
number = { 1 },
month = { September },
year = { 2015 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icwccv2015/number1/785-1552/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Communication, Computing and Virtualization
%A Vaishali Tupe
%A Vidyullata Devmane
%T Data Security in Multi-cloud Environment � A Survey
%J International Conference and Workshop on Communication, Computing and Virtualization
%@ 2249-0868
%V ICWCCV2015
%N 1
%P 0-0
%D 2015
%I International Journal of Applied Information Systems
Abstract

Cloud computing is a powerful platform; it delivers IT (Information Technology) resources as a services over the Internet. It uses their own infrastructure to maintain customer's application and data. The cloud service provider offers platform, software and infrastructure as a service to the customer on pay per use basis. It may be either single cloud or multi cloud environment. Single cloud service provider is not reliable due to data security risk. In this survey paper various security issues in single cloud environment and requirement of switching from single cloud environment to multi cloud environment are discussed. Multi cloud environment has ability to reduce security risk of single cloud.

References
  1. Amazon elastic compute cloud (EC2). http://www. amazon. com/ec2/ (18. 07. 08).
  2. Amazon simple storage service (S3). http://www. amazon. com/s3/ (18. 07. 08
  3. Amazon, Amazon Web Services. Web service licensing agreement, October3, 2006.
  4. Buyya Rajkumar, Yeo Chee Shin, Venugopal Srikumar, Broberg James and Brandic Ivona, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility", Future Generation Computer Systems (2009), pp. 599-616
  5. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
  6. Gandotra Indu, Abrol Pawanesh, Gupta Pooja, Uppal Rohit and Singh Sandeep (2011), "Cloud Computing Over Cluster, Grid Computing: a Comparative Analysis", Journal of Grid and Distributed Computing, pp-01-04
  7. Google app engine. http://appengine. google. com (18. 07. 08).
  8. Jaydip Sen, "Security and Privacy Issues in Cloud Computing"; Innovation Labs, Tata Consultancy Services Ltd. , Kolkata, INDIA
  9. Microsoft azure. http://www. microsoft. com/azure/ (30. 10. 08).
  10. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom, "Cloud Computing Security: From Single to Multi-Clouds", 2012, 45th Hawaii International Conference on System Sciences
  11. (National Institute Standard and Technology), http://www. nist. gov/itl/cloud/
  12. Sun network. com (Sun grid). http://www. network. com (18. 07. 08).
  13. Ronald L. Krutz Russell Dean Vine, "A Comprehensive Guide to Secure Cloud Computing".
Index Terms

Computer Science
Information Sciences

Keywords

Data integrity data intrusion data availability