IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 3 - Issue 6, June 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Identity Verification in Hybrid Cloud Computing

[Full Text]

 

AUTHOR(S)

S. K. Jha, Ankit Kapahi

 

KEYWORDS

Keywords: Cloud Computing, Hybrid Cloud, Data Security, Cloud Identity, Public Cloud, Private Cloud

 

ABSTRACT

ABSTRACT: Organizations are adopting cloud in their business to gain cost-efficiency and to survive amongst the best. Moving to cloud, customer organizations can utilize pay-per-usage pattern of service and innumerable advantages that cloud offers over traditional methodologies. With the diversity of purposes that cloud computing is used for, data storage is the major adopted service. This includes the storage of sensitive data like employee personal information, which increases the demand for privacy and high security in cloud. For ensuring the safety of data and information sensitive to the business, organizations must know what type of cloud to be used. Public cloud, wherein costs are low with minimum or no guarantee of safety of the data or Private cloud, wherein the customer can rely on a third party cloud vendor for safeguarding their data with complete privacy. The tug of war between public cloud and private cloud came to an end with hybrid cloud which is a connected cluster of public clouds and private clouds.Hybrid cloud can viewed as the solution for many organizations needs in terms of security and usage. The paper provides a proposed algorithm for hybrid cloud security and the comparative study between the existing security algorithm and proposed security algorithm of hybrid cloud.

 

REFERENCES

[1] Mladen A. Vouk, “Cloud Computing – Issues,Research and Implementations”, Journal of Computing and Information Technology - CIT 16, 2008, 4

[2] Bhushan Lal Sahu, Rajesh Tiwari, “a Comprehensive study on Cloud Computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 9, September 2012

[3] R.Balasubramanian,M.Aramudhan, “Security Issues: Public vs Private vs Hybrid Cloud Computing”, International Journal of Computer Applications (0975 – 8887) Volume 55– No.13, October 2012

[4] Rabi Prasad Padhy, ManasRanjanPatra, Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011
[5] Anukrati Dubey, GunjitaShrivastava& Sandeep Sahu, “Security in Hybrid Cloud”, Global Journal of Computer Science and Technology Cloud and Distributed, Volume 13 Issue 2 Version 1.0 Year 2013

[6] Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, 2012 International Conference on Computer Science and Electronics Engineering

[7] Rahul Bhoyar, Prof. Nitin Chopde, “Cloud Computing: Service models, Types, Database and ssues”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013

[8] VaibhavKhadilkar, KerimYasinOktay, Murat Kantarcioglu and SharadMehrotra, “Secure Data Processing over Hybrid Clouds”

[9] Wei Wang, Baochun Li, and Ben Liang, “Towards Optimal Capacity Segmentation with Hybrid Cloud Pricing”, Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada

[10] Bandaru A Chakravarthi, Bharat Kumar Saki, Ch Raju, P V S Sarma, IndranilSaaki, “Improving Utilization Infrastructure Management in Private and Hybrid Clouds”, International Journal of Engineering Research and Development e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 20-30

[11] Kaustav Choudhury, Diptam Dutta, KasturiSasmal, “Resource Management in a Hybrid Cloud Infrastructure”, International Journal of Computer Applications (0975 – 8887) Volume 79 – No 12, October 2013

[12] Hui Zhang, Guofei Jiang, Kenji Yoshihira, Haifeng Chen and Akhilesh Saxena, “Intelligent Workload Factoring for A Hybrid Cloud Computing Model”

[13] Sujay. R, “Hybrid Cloud: A New Era”, IJCST Vol. 2, Issue 2, June 2011

[14] Sunita Rani, AmbrishGangal, “Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints”, International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4302 – 4304

[15] Hong-Linh Truong, SchahramDustdar, and Kamal Bhattacharya, “Programming Hybrid Services in the Cloud”, IBM Research – India

[16] Amanjot Kaur, Manisha Bhardwaj, “Hybrid Encryption for Cloud Database Security”, International Journal of Engineering Science and Technology, Volume-2, Issue-3, 737 – 741

[17] Sarojadevi K, Jeevitha R, Uncloud the Cloud of Cloud Computing”, International Journal of Computer Applications in Engineering Sciences, VOL I, SPECIAL ISSUE ON AISC , DECEMBER 2011