SlideShare a Scribd company logo
1 of 21
A Study on Modest Secured Multi-Cloud
Design in Cloud Computing
Environment
Sam Navin M
M.E - Software Engineering
St. Joseph’s College of Engineering
Chennai
Agenda
 Abstract
 Cloud Computing
 Cloud Service Models
 Cloud Deployment Models
 Cloud Security
 Literature Analysis
 Summary of the Analysis
 Conclusion
 References
Abstract
Cloud is the decisive technology used by numerous people in this developing
world. As in today's cloud computing atmosphere, security is deliberated as a
notable anxiety for the cloud users. This work helps to understand the study
on the multi-cloud storage architecture. Due to some untrusted users or
hackers there occurs certain security issues in the single cloud. Several
specialists surveyed on the security issue and then they specified that the
multi-cloud data storage gives enhanced security to the cloud users when
compared to the single cloud.
Cloud Computing
 Cloud computing is designed on behalf of maintaining the application
databases and for storing the user's data on a remote server which can be
accessed effortlessly through the internet.
 The readiness, user-friendliness and tractability of computing assets
grabbed the cloud into the new ingenious model.
 Cloud encounters some specific challenges like security, load balancing,
scalability, performance, trustworthiness, cost and robustness.
 The cloud is composed of service models and deployment models.
Cloud Service Models
Cloud Service Providers (CSP’s) offer their services by using three
necessary models and they are as follows: Infrastructure as a Service
(IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
 IaaS (Infrastructure as a Service) proposes file storage, load balancers, IP
address, VM’s and firewalls.
 PaaS (Platform as a Service ) suggests operating system, data catalogue,
development tools and web server.
 SaaS (Software as a Service ) intends email, CRM (Customer
Relationship Management), games and virtual desktop.
Cloud Deployment Models
The foremost cloud deployment models are public cloud, private cloud,
community cloud and hybrid cloud.
 The public cloud structure is established for open access and it is used by
common public users.
 The private cloud structure is established specifically for the single
group or an organization which includes several customers to be
involved.
 The community cloud structure is specifically used by shared users from
administrations/governments that obligate common anxieties (concerns).
 Two or additional diverse infrastructures of cloud (public cloud, private
cloud or community cloud) combined to construct a hybrid cloud.
Cloud Security
 It is clear that although the use of cloud has speedily increased, cloud
computing security is still considered the main concern in the cloud
computing atmosphere. Cloud users do not want to lose their sensitive
data due to malicious insiders and hackers in the cloud.
 Data stored on single cloud is considered as probability of risk occurred
due to attackers easily enter in single cloud which results in service
availability failure.
 Multi-cloud is developed due to its ability to reduce security risks that
affect the cloud user.
 Shifting from single cloud to multi-cloud is to ensure the privacy and
security of users’ sensitive information.
Literature Analysis
 This work is a study on using the multi-cloud storage architecture for
providing data security and consistency to the cloud users.
 Several researchers supports the migration from single cloud to multi
cloud due to its ability to decrease security risks that affect the cloud
computing users.
 Customers do not want to lose their private information as an outcome of
malicious present in the cloud and hence many scholars move towards
multi-cloud since it has received less attention in the zone of security.
Study on different methods used for
defining the data security in
multi-cloud architecture
S:No Existing
Papers
Defined
Method
Purpose of the
Defined Method
1 Enhancement of Service
and Data Security in Multi-
Cloud Environment [1]
Secret sharing and
Homomorphic encryption
technique
This technique affords
confidentiality and safety
to the cloud user’s
thoughtful information by
distributing the information
over multiple clouds.
2 Towards Privacy-
Preserving Storage and
Retrieval in Multiple
Clouds [2]
Privacy-preserving STorage
and REtrieval (STRE)
mechanism
This mechanism make
available of secrecy,
trustworthiness and
protection for the user’s
encrypted data across
multiple self-determining
clouds.
S:No Existing
Papers
Defined
Method
Purpose of the
Defined Method
3 Data Storage in Secured
Multi-Cloud Storage in
Cloud Computing [5]
Secured Cost-effective
Multi-Cloud Storage
(SCMCS) model
This model provides
effectual distribution of
data amongst prevailing
cloud service providers in
order to distribute data
readiness and confidence
to cloud users.
4 Truly Secured Multi-Cloud
Data Using Advanced
Encryption Standard (AES)
[6]
AES (Advanced
Encryption Standard)
method
This method is used in
multiple clouds for
effective and speedy
encryption and decryption
of user's sensitive data in
secure way.
5 Security in Multi-Cloud
Data Storage with SIC
Architecture [7]
SIC - Secure Inter-Cloud
Architecture
This architecture provides
safe and secure cloud
environment for the cloud
user’s to store and access
the data without any cause
or delay.
S:No Existing
Papers
Defined
Method
Purpose of the
Defined Method
6 Enhanced File Security
using Encryption and
Splitting technique over
Multi-cloud Environment
[8]
Encryption and Splitting
technique
User's file fidelity and
security are improved by
using this technique. The
file is been split and
encrypted in multiple
clouds for providing
protection & reliability for
cloud users during the file
retrieval.
7 Enhanced Security for
Multi-Cloud Storage using
AES Algorithm [9]
AES algorithm and MD5
technique
AES algorithm is used for
splitting the encrypted file
into diverse chunks and to
store it in multiple clouds.
MD5 used to substantiate
the data with the pair of
cloud servers.
Summary of the Analysis
 This work affords the detailed study on the advantage of using multi-
cloud storage in cloud computing.
 Many researchers support multi-cloud model as it stretches an enhanced
security and convenience of user secured data but in case of single cloud
it is examined that the data can be hewed straightforwardly by the
hacker.
 Multi-cloud platform come across the necessities of cloud users
proficiently than the single cloud by avoiding the unattainability of cloud
service and the confidentiality hazards and hence the researchers
describe that overall performance of multi-cloud is improved by
providing trustworthiness and consistency among all the cloud users.
Modest Multi-cloud Design
Conclusion
As users increasing habitually in the present-day cloud scenario the
trustworthiness, fidelity, cost and easier data retrieval provide an enhanced
advantage among cloud users. Security is reflected as the utmost precarious
threat that ought to be absorbed sensibly. Through various analysis of
security in a cloud platform, this work provides the survey on using the
multi-cloud storage model. Many researchers deliver that the security
delinquent is astonished by the multi-cloud model. Hence by analyzing the
various studies , it is considered that the security risks which distress the
cloud users are condensed by using the multi-cloud structural design.
References
[1] M. Nivetha Mani, and R. Murugan, “Enhancement of Service and Data
Security in Multi-Cloud Environment,” International Journal of Innovative
Research in Computer and Communication Engineering, vol. 4, issue 10,
October 2016.
[2] Jingwei Li, Dan Lin, Anna Cinzia Squicciarini, Jin Li, and Chunfu Jia,
“Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds,” IEEE
Transactions on Cloud Computing, vol. 5, no. 3, September 2017.
[3] Nitesh Shrivastava and Ganesh Kumar, “A Survey on Cost Effective Multi-
cloud Storage in Cloud Computing,” International Journal of Advanced Research
in Computer Engineering & Technology (IJARCET) , vol. 2, issue 4, April 2013.
[4] B. AmarNadh Reddy and P. Raja Sekhar Reddy, “Effective Data
Distribution Techniques for Multi-Cloud Storage in Cloud Computing,”
International Journal of Engineering Research and Applications (IJERA), vol. 2,
issue 5, October 2012.
[5] Archana Waghmare, Rahul Patil, Pramod Mane and Shruti Bhosale, “Data
Storage in Secured Multi-Cloud Storage in Cloud Computing,” International
Journal of Computational Engineering Research, vol. 04, issue. 2, February 2014.
[6] Shubham Aher, Salman Shaikh, Arsalaan Merchant and Krishna Palav,
“Truly Secured Multi-Cloud Data Using Advanced Encryption Standard (AES),”
International Journal of Innovative Research in Computer and Communication
Engineering, vol. 4, issue 1, January 2016.
[7] Kalyani. M. Borse, Ankita. G. Deshpande, Ashlesha. A. Deshpande and
Juily. S. Hardas, “Security in Multi-Cloud Data Storage with SIC Architecture,”
International Journal of Research in Engineering and Technology, vol. 3, issue 2,
Feb-2014.
[8] Nisha D. Dable and Nitin Mishra, “Enhanced File Security using Encryption
and Splitting technique over Multi-cloud Environment,” International Journal on
Advanced Computer Theory and Engineering (IJACTE), vol. 3, issue 4, 2014.
[9] Namita N. Pathak and Meghana Nagori, “Enhanced Security for Multi
Cloud Storage using AES Algorithm,” International Journal of Computer Science
and Information Technologies, vol. 6, issue 6, 2015.
[10] G. Sidharth and D. Baswaraj, “Cloud Computing Security from Single to
Multi-Clouds,” International Journal of Computer Science and Mobile
Computing, vol. 2, issue. 10, October 2013.
[11] J.M. Patil and B. S. Sonune, “Data Security using Multi Cloud
Architecture,” International Journal on Recent and Innovation Trends in
Computing and Communication, vol. 3, issue 5, May 2015.
[12] K. Subramanian and F. Leo John, “Data Security in Single and Multi-
Cloud Storage–An Overview,” International Journal of Innovative Research in
Computer and Communication Engineering, vol. 4, issue 11, November 2016.
THANK YOU

More Related Content

What's hot

Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGijccsa
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewEswar Publications
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing IJECEIAES
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 

What's hot (18)

Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Cloud computing final
Cloud computing finalCloud computing final
Cloud computing final
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 

Similar to Study on Multi cloud Security

SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYijsrd.com
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challengesijsptm
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 

Similar to Study on Multi cloud Security (20)

SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
C017421624
C017421624C017421624
C017421624
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Cloud security
Cloud security Cloud security
Cloud security
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
U04503119122
U04503119122U04503119122
U04503119122
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 

Recently uploaded

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Study on Multi cloud Security

  • 1. A Study on Modest Secured Multi-Cloud Design in Cloud Computing Environment Sam Navin M M.E - Software Engineering St. Joseph’s College of Engineering Chennai
  • 2. Agenda  Abstract  Cloud Computing  Cloud Service Models  Cloud Deployment Models  Cloud Security  Literature Analysis  Summary of the Analysis  Conclusion  References
  • 3. Abstract Cloud is the decisive technology used by numerous people in this developing world. As in today's cloud computing atmosphere, security is deliberated as a notable anxiety for the cloud users. This work helps to understand the study on the multi-cloud storage architecture. Due to some untrusted users or hackers there occurs certain security issues in the single cloud. Several specialists surveyed on the security issue and then they specified that the multi-cloud data storage gives enhanced security to the cloud users when compared to the single cloud.
  • 4. Cloud Computing  Cloud computing is designed on behalf of maintaining the application databases and for storing the user's data on a remote server which can be accessed effortlessly through the internet.  The readiness, user-friendliness and tractability of computing assets grabbed the cloud into the new ingenious model.  Cloud encounters some specific challenges like security, load balancing, scalability, performance, trustworthiness, cost and robustness.  The cloud is composed of service models and deployment models.
  • 6. Cloud Service Providers (CSP’s) offer their services by using three necessary models and they are as follows: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).  IaaS (Infrastructure as a Service) proposes file storage, load balancers, IP address, VM’s and firewalls.  PaaS (Platform as a Service ) suggests operating system, data catalogue, development tools and web server.  SaaS (Software as a Service ) intends email, CRM (Customer Relationship Management), games and virtual desktop.
  • 8. The foremost cloud deployment models are public cloud, private cloud, community cloud and hybrid cloud.  The public cloud structure is established for open access and it is used by common public users.  The private cloud structure is established specifically for the single group or an organization which includes several customers to be involved.  The community cloud structure is specifically used by shared users from administrations/governments that obligate common anxieties (concerns).  Two or additional diverse infrastructures of cloud (public cloud, private cloud or community cloud) combined to construct a hybrid cloud.
  • 9. Cloud Security  It is clear that although the use of cloud has speedily increased, cloud computing security is still considered the main concern in the cloud computing atmosphere. Cloud users do not want to lose their sensitive data due to malicious insiders and hackers in the cloud.  Data stored on single cloud is considered as probability of risk occurred due to attackers easily enter in single cloud which results in service availability failure.  Multi-cloud is developed due to its ability to reduce security risks that affect the cloud user.  Shifting from single cloud to multi-cloud is to ensure the privacy and security of users’ sensitive information.
  • 10. Literature Analysis  This work is a study on using the multi-cloud storage architecture for providing data security and consistency to the cloud users.  Several researchers supports the migration from single cloud to multi cloud due to its ability to decrease security risks that affect the cloud computing users.  Customers do not want to lose their private information as an outcome of malicious present in the cloud and hence many scholars move towards multi-cloud since it has received less attention in the zone of security.
  • 11. Study on different methods used for defining the data security in multi-cloud architecture S:No Existing Papers Defined Method Purpose of the Defined Method 1 Enhancement of Service and Data Security in Multi- Cloud Environment [1] Secret sharing and Homomorphic encryption technique This technique affords confidentiality and safety to the cloud user’s thoughtful information by distributing the information over multiple clouds. 2 Towards Privacy- Preserving Storage and Retrieval in Multiple Clouds [2] Privacy-preserving STorage and REtrieval (STRE) mechanism This mechanism make available of secrecy, trustworthiness and protection for the user’s encrypted data across multiple self-determining clouds.
  • 12. S:No Existing Papers Defined Method Purpose of the Defined Method 3 Data Storage in Secured Multi-Cloud Storage in Cloud Computing [5] Secured Cost-effective Multi-Cloud Storage (SCMCS) model This model provides effectual distribution of data amongst prevailing cloud service providers in order to distribute data readiness and confidence to cloud users. 4 Truly Secured Multi-Cloud Data Using Advanced Encryption Standard (AES) [6] AES (Advanced Encryption Standard) method This method is used in multiple clouds for effective and speedy encryption and decryption of user's sensitive data in secure way. 5 Security in Multi-Cloud Data Storage with SIC Architecture [7] SIC - Secure Inter-Cloud Architecture This architecture provides safe and secure cloud environment for the cloud user’s to store and access the data without any cause or delay.
  • 13. S:No Existing Papers Defined Method Purpose of the Defined Method 6 Enhanced File Security using Encryption and Splitting technique over Multi-cloud Environment [8] Encryption and Splitting technique User's file fidelity and security are improved by using this technique. The file is been split and encrypted in multiple clouds for providing protection & reliability for cloud users during the file retrieval. 7 Enhanced Security for Multi-Cloud Storage using AES Algorithm [9] AES algorithm and MD5 technique AES algorithm is used for splitting the encrypted file into diverse chunks and to store it in multiple clouds. MD5 used to substantiate the data with the pair of cloud servers.
  • 14. Summary of the Analysis  This work affords the detailed study on the advantage of using multi- cloud storage in cloud computing.  Many researchers support multi-cloud model as it stretches an enhanced security and convenience of user secured data but in case of single cloud it is examined that the data can be hewed straightforwardly by the hacker.  Multi-cloud platform come across the necessities of cloud users proficiently than the single cloud by avoiding the unattainability of cloud service and the confidentiality hazards and hence the researchers describe that overall performance of multi-cloud is improved by providing trustworthiness and consistency among all the cloud users.
  • 16. Conclusion As users increasing habitually in the present-day cloud scenario the trustworthiness, fidelity, cost and easier data retrieval provide an enhanced advantage among cloud users. Security is reflected as the utmost precarious threat that ought to be absorbed sensibly. Through various analysis of security in a cloud platform, this work provides the survey on using the multi-cloud storage model. Many researchers deliver that the security delinquent is astonished by the multi-cloud model. Hence by analyzing the various studies , it is considered that the security risks which distress the cloud users are condensed by using the multi-cloud structural design.
  • 17. References [1] M. Nivetha Mani, and R. Murugan, “Enhancement of Service and Data Security in Multi-Cloud Environment,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, issue 10, October 2016. [2] Jingwei Li, Dan Lin, Anna Cinzia Squicciarini, Jin Li, and Chunfu Jia, “Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, September 2017. [3] Nitesh Shrivastava and Ganesh Kumar, “A Survey on Cost Effective Multi- cloud Storage in Cloud Computing,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) , vol. 2, issue 4, April 2013.
  • 18. [4] B. AmarNadh Reddy and P. Raja Sekhar Reddy, “Effective Data Distribution Techniques for Multi-Cloud Storage in Cloud Computing,” International Journal of Engineering Research and Applications (IJERA), vol. 2, issue 5, October 2012. [5] Archana Waghmare, Rahul Patil, Pramod Mane and Shruti Bhosale, “Data Storage in Secured Multi-Cloud Storage in Cloud Computing,” International Journal of Computational Engineering Research, vol. 04, issue. 2, February 2014. [6] Shubham Aher, Salman Shaikh, Arsalaan Merchant and Krishna Palav, “Truly Secured Multi-Cloud Data Using Advanced Encryption Standard (AES),” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, issue 1, January 2016.
  • 19. [7] Kalyani. M. Borse, Ankita. G. Deshpande, Ashlesha. A. Deshpande and Juily. S. Hardas, “Security in Multi-Cloud Data Storage with SIC Architecture,” International Journal of Research in Engineering and Technology, vol. 3, issue 2, Feb-2014. [8] Nisha D. Dable and Nitin Mishra, “Enhanced File Security using Encryption and Splitting technique over Multi-cloud Environment,” International Journal on Advanced Computer Theory and Engineering (IJACTE), vol. 3, issue 4, 2014. [9] Namita N. Pathak and Meghana Nagori, “Enhanced Security for Multi Cloud Storage using AES Algorithm,” International Journal of Computer Science and Information Technologies, vol. 6, issue 6, 2015.
  • 20. [10] G. Sidharth and D. Baswaraj, “Cloud Computing Security from Single to Multi-Clouds,” International Journal of Computer Science and Mobile Computing, vol. 2, issue. 10, October 2013. [11] J.M. Patil and B. S. Sonune, “Data Security using Multi Cloud Architecture,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, issue 5, May 2015. [12] K. Subramanian and F. Leo John, “Data Security in Single and Multi- Cloud Storage–An Overview,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, issue 11, November 2016.