IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 3 - Issue 12, December 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Joint Collaboration Structure For Multi Cloud Frameworks And Security Issues

[Full Text]

 

AUTHOR(S)

B.Mahesh, D.Durgaprasad

 

KEYWORDS

Keywords : Internet, Cloud computing, Framework, Cloud services, Multi-tenant, Security.

 

ABSTRACT

ABSTRACT: Cloud computing has emerged as a popular paradigm that offers computing resources (e.g. CPU, storage, bandwidth, software) as scalable and on-demand services over the Internet. The multi-cloud environment can end the vendor lock-in of the consumer which is a trait in the single cloud. The significant zone of concern in this field is the understanding between the cloud service providers for collaboration of their services in multi-cloud. Data fragmentation plays an important role in data distribution. In this paper, we proposed a mixed fragmentation technique for data distribution through the collaboration multi-cloud model which holds an economical distribution of data among the available Service Providers in the market, to provide customers with achievable distributing merits which intern includes preserving confidentiality, integrity and availability(CIA) perimeters by making use of multiple distinct clouds simultaneously.

 

REFERENCES

[1] S. M. M1. W. Itani, A. Kayssi, A. Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Pro-cessing in Cloud Computing Architectures,” Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Dec 2009.

[2] Jake Widman, 10 massive security breaches, http://www.informationweek.com/news/galleries/Security/attacks/229300675, Visited 8.11.2015..

[3] Stefano ceri Giuseppe pelagati “Distributed Data-bases-Principles and systems”Tata MC Graw Hill 2008.

[4] R. Thandeeswaran, S. Subhashini, N. Jeyanthi1, M. A. SaleemDurai, “Secured Multi-Cloud Virtual Infra-structurewith Improved Performance”, cybernetics and information technologies XII, ( 2), pp. 11-22, 2012

[5] MukeshSinghal and Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu and Ram Krishnan, Gail-JoonAhn, andElisaBertino “Collaboration in Multicloud Computing Environments: Framework and Security Issues”, Published by the IEEE Computer Society IEEE, 2013.

[6] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On Technical Security Issues in Cloud Computing,” Proc. IEEE Int’l Conf. CloudComputing (CLOUD-II), 2009.

[7] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,Version 15,” Nat’l Inst. of Standards and Technology, InformationTechnology Laboratory, vol. 53, p. 50, http://csrc.nist.gov/groups/SNS/cloud-computing/, 2010.

[8] Mohamed Almorsy, John Grundy, and Amani S. Ibrahim, “TOSSMA: A Tenant-Oriented SaaS Security Management Architecture”, 5th IEEE Conference on Cloud computing IEEE, 2012.

[9] P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. M´edard,“Trusted storage over untrusted networks”, IEEE GLOBECOM 2010, Miami, FL. USA.

[10] M. Armbrust, A. Fox, R. Grifth, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: Aberkeley view of cloud computing. Technical re-port, University of California at Berkeley, February 2009.