Open Access Open Access  Restricted Access Subscription or Fee Access

Security Issues Using Multi Clouds

R. Kavitha

Abstract


Cloud computing is one of today‟s most exciting
technologies, which involves deployment of various services like software, web services and virtualized infrastructure, as a product on public, private or hybrid clouds on lease basis. Security is considered to be one of the most critical aspects in a cloud computing environment due to the sensitive and important information stored in
the cloud for users. The customers face difficult in trading single cloud providers due to risk in service availability and the possibility of malicious insiders. A movement towards “multi-clouds” or in other words, “inter clouds” or “cloud-of-clouds” has emerged recently. Movement towards multi cloud will mitigate the security problem. This paper explains characteristics and the delivery models
for cloud computing in short and focuses on the security factors in cloud computing and addresses possible solutions. The paper analyzes the recent research related to the protocols for inter clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.


Keywords


Cloud Computing, Cloud Storage, Data Integrity, Data Intrusion, Database-as-a-Service, Multi-Clouds, Security, Single Cloud, Service Availability.

Full Text:

PDF

References


R.Kavitha,”Security: From Single Cloud to Multi Clouds,NCISE‟12,pp

-181.

S. Subashini and V. Kavitha, "A survey on security issues in service

delivery models of cloud computing", Journal of Network and Computer

Applications, 34(1), 2011, pp 1-11.

(NIST), http://www.nist.gov/itl/cloud/.

G. Brunette and R. Mogull (eds), "Security guidance for critical areas of

focus in cloud computing", Cloud Security Alliance, 2009.

J. Viega, "Cloud computing and the common man", Computer, 42, 2009,

pp. 106-108.

C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM

SIGACT News, 40, 2009, pp. 81-86.

Clavister, "Security in the cloud", Clavister WhitePaper, 2008.

H.Mei, J. Dawei, L. Guoliang and Z. Yuan,"Supporting Database

Applications as a Service",ICDE'09:Proc. 25thIntl.Conf. on Data

Engineering,2009, pp. 832-843.

C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data storage security

in cloud computing", 2010, pp. 1-9.

H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and Privacy Challenges

in Cloud Computing Environments", IEEE Security & Privacy,

(6),2010, pp. 24-31.

T. Ristenpart, E. Tromer, H. Shacham and S. Savage, "Hey, you, get off

of my cloud: exploring information leakage in third-party compute

clouds", CCS'09: Proc. 16thACM Conf. on Computer and

communications security, 2009, pp. 199-212.

Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky:

dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc.

thConf. On Computer systems, 2011, pp. 31-46.

Wayne A.Jansen,(Cloud Hooks:Security and Privacy issues in Cloud

Computing),44th Hawaii International Conference on System Sciences

M. Vukolic The Byzantine empire in the intercloud, ACM SIGACT

News, 41 (2010), pp. 105-111.

C. Cachin, R. Haas and M. Vukolic, Dependable storage in the

Intercloud, Research Report RZ, 3783 (2010), pp. 1-6.

H. Abu-Libdeh, L. Princehouse and H.Weatherspoon, RACS: a case for

cloud storage diversity, ACM, 2010, pp. 229-240.

K. D. Bowers, A. Juels and A. Oprea, HAIL: A high-availability and

integrity layer for cloud storage, ACM, 2009, pp. 187-198.

P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin and M.

Walfish, "Depot: Cloud storage with minimal trust", OSDI'10: Proc. of

the 9th USENIX Conf. on Operating systems design and

implementation, 2010, pp. 1-16.

Mohammed A.Alzin,Ben Soh and Eric Pardede,9th International

Conference on Dependable,Automatic and Secure

Computing,2011,pp.784-791.

M. A. AlZain and E. Pardede, Using Multi Shares for Ensuring Privacy

in Database-as-a-Service, 2011 44th Hawaii International Conference on

System Sciences (HICSS), 2011, pp. 1-9.

Flavio Lombardi & Roberto Di Pietro,”Transperent Security for

Cloud”,SAC 10 March 22-26 ,2010,Sierre,Switzerland.

M. Vukolic,"The Byzantine empire in the intercloud", ACM SIGACT

News, 41,2010, pp. 105-111.

C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded

Byzantine distributed storage", DISC:Proc. 19thIntl.Conf. on Distributed

Computing, 2005, pp. 497-498.

G.R. Goodson, J.J. Wylie, G.R. Ganger and M.K. Reiter, "Efficient

Byzantine-tolerant erasure-coded storage",DSN'04: Proc.Intl. Conf. on

Dependable Systems and Networks,2004, pp.1-22.

D. Malkhi and M. Reiter, "Byzantine quorum systems", Distributed

Computing, 11(4),1998, pp. 203-213.

J.-P. Martin, L. Alvisi and M. Dahlin, "Minimal byzantine storage",

DISC '02: Proc. of the 16thIntl. Conf. on Distributed Computing, 2002,

pp. 311- 325

M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy

in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences

(HICSS), 2011, pp. 1-9.

S. Kamara and K. Lauter, "Cryptographic cloud storage", FC'10: Proc.

thIntl.Conf. on Financial cryptograpy and data security,2010, pp. 136-

A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC:

Group collaboration using untrusted cloud resources", OSDI,

October2010, pp. 1-14.

Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky and D. Shaket,

"Venus: Verification for untrusted cloud storage", CCSW'10: Proc.

ACM workshop on Cloud computing security workshop, 2010, pp. 19-

M. Van Dijk and A. Juels, "On the impossibility of cryptography alone

for privacy-preserving cloud computing", HotSec'10: Proc. 5thUSENIX

Conf. on Hot topics in security, 2010, pp.1-8.

N. Santos, K.P. Gummadi and R. Rodrigues, "Towards trusted cloud

computing", USENIX Association, 2009, pp. 3-3.

S. L. Garfinkel, An evaluation of amazon‟s grid computing services:

EC2, S3, and SQS, Citeseer, 2007, pp. 1-15.

H. Krawczyk, M. Bellare and R. Canetti, HMAC: Keyed-hashing for

message authentication, Citeseer, 1997, pp. 1-11.

R.C. Merkle, "Protocols for public key cryptosystems", IEEE

Symposium on Security and Privacy, 1980, pp. 122-134.

M. Castro and B. Liskov, "Practical Byzantine fault tolerance",

Operating Systems Review, 33, 1998, pp. 173-186.

J. Hendricks, G.R. Ganger and M.K. Reiter, "Lowoverhead byzantine

fault-tolerant storage”2007, pp. 73-86.

Amazon, Amazon Web Services. Web services licensing agreement,

October3,2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.