To see the other types of publications on this topic, follow the link: Multi cloud storage.

Journal articles on the topic 'Multi cloud storage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi cloud storage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pykulytsky, Oleh, and Bohdan Havano. "Cloud Key-Value Storage." Advances in Cyber-Physical Systems 8, no. 2 (2023): 133–41. http://dx.doi.org/10.23939/acps2023.02.133.

Full text
Abstract:
The paper represents all the stages of designing, architecting, and developing cloud-based key-value storage. This work aims to bring new approaches to distributed data systems. The authors focus on the security and productivity of the project as well as security and maintainability. The authors have studied the use of hash tables in a multi-threaded environment. Architectural approaches and tools have been described. The general structure of the key-value storage server has been presented. The server algorithm has been presented. Our research delves into the intricate nuances of utilizing hash tables in a multi-threaded environment, shedding light on the intricacies and challenges of managing concurrent access to key-value data structures. The authors have explored the trade-offs between lock-free designs and traditional locking approaches.
APA, Harvard, Vancouver, ISO, and other styles
2

Yin, Kai Ze, and Hai Hang Wang. "MCACM: A Cloud Storage Access Control Model for Multi-Clouds Environment Based on XACML." Applied Mechanics and Materials 713-715 (January 2015): 2451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2451.

Full text
Abstract:
Cloud storage as a popular application in cloud services, are developing from single cloud service provider towards multiple cloud service providers. As a consequence, users need to manage their files from different sources and share in multi-clouds. While the conventional access control models are no longer suitable in multi-clouds environment. Therefore, a multi-clouds access control model based on XACML, named MCACM, is proposed here to implement access control in multi-clouds environment. In this model, cross-clouds access control is enabled through extending standard XACML framework. At last, we implemented a prototype of MCACM, and performance evaluation results show that our scheme is efficient.
APA, Harvard, Vancouver, ISO, and other styles
3

SHEN, Lu, Shifang FENG, Jinjin SUN, et al. "CloudS: A Multi-Cloud Storage System with Multi-Level Security." IEICE Transactions on Information and Systems E99.D, no. 8 (2016): 2036–43. http://dx.doi.org/10.1587/transinf.2015inp0009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kapse, Prashant Shankar, Onkar Dhananjaya Swami, Dadaso Sopan Keskar, Ruturaj Avinash Kadam, and Dr S. N. Gujar. "StoreSim: Optimizing Information Leakage in Multi-Cloud Storage Services." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1048–51. http://dx.doi.org/10.22214/ijraset.2022.42427.

Full text
Abstract:
Abstract: Many schemes have been recently advanced for storing data on multiple clouds. Distributing data over different cloud storage providers (CSPs) automatically provides users with a certain degree of information leakage control, as no single point of attack can leak all a user’s information. However, unplanned distribution of data chunks can lead to high information disclosure even while using multiple clouds. In this paper, to address this problem, we present Store-Sim, an information leakage-aware storage system in multi cloud. Store-Sim aims to store syntactically similar data on the same cloud, thus minimizing the user’s information leakage across multiple clouds. We design an approximate algorithm to efficiently generate similarity- preserving signatures for data chunks based on Min-Hash and Bloom filters, and design a function to compute the information leakage based on these signatures. Next, we present an effective storage plan generation algorithm based on clustering for distributing data chunks with minimal information leakage across multiple clouds. Finally, we evaluated our scheme using two real datasets from Wikipedia and GitHub. We show that our scheme can reduce information leakage by up to 60-70 Percent. Keywords: Min-Hash, Bloom-Filter, Multi-Cloud, StoreSim, Data Leakage.
APA, Harvard, Vancouver, ISO, and other styles
5

T, Manindra, and Pradeep K. V. "DATA COMPRESSION TECHNIQUE FOR CLOUD STORAGE IN MULTI-USER ENVIRONMENTS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 82. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19570.

Full text
Abstract:
In many associations, the cloud storages contain a copy (duplicates) of information. For example, the same file would be spared in various locations by different users; too many documents that are not differentiable may in any case duplication a great part of the same data. This consumes lots of memory in cloud storage. Deduplication is a kind of technique used to eliminate duplicate entries on cloud storage. It helps us to remove the duplicate entries of these additional duplicates, by maintaining only one duplicate of the information and giving ownership rights to the alternate duplicates with pointers that lead back to the first duplicate. Organizations much of the time utilizes this technique in cloud storage for many applications, yet it can be effectively utilized to free up space in vital situations also. To allow an end-user to have the ownership of the file if the file is already existing and should terminate the uploading process to the cloud storage server
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Yi Jie, Zhen Qiao, and Ming Zhong Xiao. "One Cloud: A Secure and Anonymous Multi-Cloud Oblivious Storage Architecture." Applied Mechanics and Materials 556-562 (May 2014): 5591–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5591.

Full text
Abstract:
We present a cross-cloud storage architecture that protects both user’s data and privacy from cloud providers or potential adversaries by leveraging the concept of Oblivious RAM on a logical layer. Our architecture allows users to conceal reading/writing operations and access sequences from clouds in order to prevent the leakage of access patterns, which may be a threat to data security. In addition, an anonymity preserving mechanism applied in our architecture makes it difficult to track users' data or confirm users' identities, which can effectively protect users' privacy. One Cloud, the proof-of-concept prototype of our architecture integrates four major cloud storage services and implements all key techniques we proposed in our architecture. We deploy it in a real-world network environment to analyze and evaluate the performance and the scalability of our architecture.
APA, Harvard, Vancouver, ISO, and other styles
7

Agade, Ashwini, Arohi Kumari Arohi Kumari, Anupriya Kadlag, and Sushama Hadule. "Towards Secured and Trusted Multi Cloud Storage with Backup Linkn." International Journal of Scientific Research 3, no. 4 (2012): 183–84. http://dx.doi.org/10.15373/22778179/apr2014/62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

SAIF, SAAD ALNUAIMI, A. SUNDARARAJAN ELANKOVAN, and HADI ABD RAHMAN ABDUL. "BANDWIDTH REALLOCATION APPROACH FOR OPTIMIZED DATA SLICES DISTRIBUTION OVER MULTI CLOUD STORAGE." Journal of Theoretical and Applied Information Technology 100, no. 22 (2022): 6667–76. https://doi.org/10.5281/zenodo.7476924.

Full text
Abstract:
This paper sheds light on cloud computing and the importance of storing data in multiple clouds. Here it becomes an obvious necessity as when large data is transferred to a single cloud; transmission time becomes excessive. A large data distribution on more than one cloud is better for solving a time-consuming problem. However, some factors affect the transmission process as the speed of data transmission varies from one cloud to another and the size of the Internet data packet provided by the service provider. This paper proposed an optimization method to improve the transmission process and optimally redistribute the data packet to prevent data bottlenecks during transmission. It was evident from the research results that the proposed optimization method for distributing data over several clouds with optimal bandwidth reallocation is 13.58% better when compared with the method of equal distribution of data over several clouds without taking into account the optimal bandwidth reallocation.
APA, Harvard, Vancouver, ISO, and other styles
9

Ojha, Pranav. "Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems." Journal of Research in Science and Engineering 6, no. 8 (2024): 52–56. http://dx.doi.org/10.53469/jrse.2024.06(08).12.

Full text
Abstract:
Cloud computing has increased rapidly in many organizations and then it's utilized. Cloud computing provides safe data. Cloud computing provides many advantages in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards "multi - clouds", or in other words, "inter clouds" or "cloud - of - clouds" has emerged recently. We propose the recent research related to single and multi - cloud security and address possible solutions. It is found that the research into the use of multi - cloud providers to maintain security has received less attention from the research community than the use of single clouds. This work aims to promote the use of multi - clouds due to their ability to reduce security risks that affect the cloud computing user. We proposed the AES algorithm can explore the cloud sharing to multiple clouds. This algorithm protects secure to personal information, financial records, and other confidential records. The system is highly effective in accuracy.
APA, Harvard, Vancouver, ISO, and other styles
10

M.V., Bramhe. "Multi-Cloud Based Secured Storage System." HELIX 8, no. 5 (2018): 4019–23. http://dx.doi.org/10.29042/2018-4019-4023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Junghanns, Philipp, Benjamin Fabian, and Tatiana Ermakova. "Engineering of secure multi-cloud storage." Computers in Industry 83 (December 2016): 108–20. http://dx.doi.org/10.1016/j.compind.2016.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nandigana, Vishal. "Multi-Scale Data Center Room for Computing and Storage." Indonesian Journal of Computer Science 10, no. 2 (2021): 238–44. http://dx.doi.org/10.33022/ijcs.v10i2.3018.

Full text
Abstract:
In this paper, a list of multi-scale data center system computers and data Storage devices for cloud computing and transfer of cloud computing data and storage and computations in a square 100 meters room is worked for AIDesign software for cloud computing data storage using the devices and computing using the same storage requirements and performing the transfer of data storage and data transfer and computations for AIDesign software to perform the operations, computing, storage and data transfer to enable milliseconds computing of design and analysis in the cloud computing storage facility room. AIDesign software is patented, and industries approved and commercially available over https://aidesign.today.
APA, Harvard, Vancouver, ISO, and other styles
13

AlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.

Full text
Abstract:
Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.
APA, Harvard, Vancouver, ISO, and other styles
14

Lalitha, Singh* Prof. Jyoti Malhotra Prof. Sayalee Narkhede. "SECURE DATA STORAGE IN MULTI CLOUD ENVIRONMENT USING APACHE HADOOP." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 5 (2016): 126–33. https://doi.org/10.5281/zenodo.51006.

Full text
Abstract:
Cloud computing and Hadoop has become a new distributed storage model for most of the organizations, Industries etc. It provides a pay per use model in which customer has to only pay for the data he is storing on the cloud. However, relying on a single cloud storage provider has resulted in problems like vendor lock in. Therefore multi cloud environment is used to address the security and the data availability problems. In this paper, we proposed a system that uses Hadoop computing platform in multi cloud domain for storing customer’s data reliably. Hadoop is used to conquer single point of failure problem which has been main issue in centralized environment as well as to deal with remote uploading.
APA, Harvard, Vancouver, ISO, and other styles
15

Rishabh, Mudgal*1 &. Mrs. Kirti Bhatia2. "ENHANCING DATA SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER MULTI-CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 440–49. https://doi.org/10.5281/zenodo.1345684.

Full text
Abstract:
Now days cloud computing become one of the main topic of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an important concern. The meaning of data storage security is to secure data on storage media. Cloud storage does not require any hardware and software management. it provide high quality applications. As we proposed the concept of cloud data storage security strategy capable to overcome the shortcomings of traditional data protection algorithms and improving security using steganography, encryption decryption techniques, compression and splitting technique adoptable to better security for the cloud. We have developed a desktop application through which user can share data. This paper enhanced advance security goal for cloud data storage.
APA, Harvard, Vancouver, ISO, and other styles
16

Bedi, Rajeev Kumar, Jaswinder Singh, and Sunil Kumar Gupta. "A Novel Approach for Multi-Cloud Storage for Mobile Devices." International Journal of Information Technology and Web Engineering 13, no. 2 (2018): 24–36. http://dx.doi.org/10.4018/ijitwe.2018040103.

Full text
Abstract:
Regardless of high embracing rate among users, Multi Cloud Storage Systems for mobile devices still have many limitations. From recent studies, it is clear that multi cloud storage systems work well for desktop PCs where there is no resource limitation but when accessed on mobile devices, these systems consumed a lot of resources of the mobile device. In this article, the authors reviewed three multi cloud storage systems for mobile devices ES File Explorer, Mult Cloud, Otixo and evaluate their performance on the basis of parameters Battery Consumption, CPU Usage, and Data Usage on Jio-Fi network using two mobile devices Micromax Canvas E352 and Redmi Note 4. Then, the authors propose an approach for multi cloud storage for mobile devices that will remove the limitations of previously discussed systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Tatipally, Sampath Kumar, and Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

M, Nandhini, and Dr Madhavi S. "Provisioning of Data Security for File Transformation on Multi Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (2019): 15–16. http://dx.doi.org/10.9756/bijsesc.9007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bezuglova, E. S., E. M. Shiryaev, M. G. Babenko, A. Tchernykh, B. Pulido-Gaytan та J. M. Corte´s-Mendoza. "Обзор безопасности мультиоблачных хранилищ: угрозы и меры противодействия". Вычислительные технологии, № 1 (15 березня 2023): 72–80. http://dx.doi.org/10.25743/ict.2023.28.1.008.

Full text
Abstract:
In this paper, we study multi-cloud storage technologies that share information as a single system using services from different cloud providers. These technologies provide advantages related to the availability and cost but need protections from security threats such as collusion and data leakage, limiting its massive adoption. We analyze security methods for multi-cloud storage and present the last advances in the field. We show that security systems based on homomorphic encryption are more promising than conventional security methods due to the possibility of performing operations over encrypted data. Аннотация Представлены результаты изучения технологий мультиоблачных хранилищ, обменивающихся информацией с помощью сервисов различных провайдеров и являющихся единой системой. Мультиоблачные хранилища доступны и имеют низкую стоимость, но нуждаются в дополнительном обеспечении безопасности для противостояния хакерским атакам и утечке данных, что является ограничением для массового пользовательского внедрения данной технологии. Проанализированы существующие методы обеспечения безопасности и последние достижения в этой области. Сделан вывод, что системы безопасности, основанные на гомоморфном шифровании, превосходят традиционные методы защиты, так как в них возможно выполнение операций над зашифрованными данными.
APA, Harvard, Vancouver, ISO, and other styles
20

Arunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.

Full text
Abstract:
Now-a-days, most hospitals and medical centers is to manage huge volume of patient’s medical records into database. It is essential to collect and access this information everywhere, to increase productivity and improve quality of health cares. Need to access electronic health information across the world and improve the quality of healthcare to patients will highlight importance of using cloud computing architecture in this area. But, despite the benefits of cloud computing applications for health care, the security challenges of cloud should be addressed. In this paper, we introduce and describe a new proposed model called Electronic Health Record with Multi-Clouds Databases. This model will ensure the privacy of persons in a network and multi-cloud environment using cryptographic algorithm and distributed storage. This model is able to store any type of data such as number, string, image, etc. in a cloud environment. The Electronic Health Record with Multi-Clouds Database prevent from illegal intrusion and access to data in cloud environment and provide services such as data integrity, confidentiality and permanent availability of data in a safe and secure way. The evaluation results of proposed method show that despite increasing time of information storage and retrieval and System overhead
APA, Harvard, Vancouver, ISO, and other styles
21

Anitha, K. L., and Gopalakrishnan Nair T.R. "Data storage lock algorithm with cryptographic techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3843–49. https://doi.org/10.11591/ijece.v9i5.pp3843-3849.

Full text
Abstract:
The cloud computing had its impact far and wide, and Enterprise solutions are getting migrated to different types of clouds. The services are delivered from the data centers which are located all over the world. As the data is roaming with less control in any data centers, data security issues in cloud are very challenging. Therefore we need multi-level authentication, data integrity, privacy and above all encryption to safeguard our data which is stored on to the cloud. The data and applications cannot be relocated to a virtual server without much degree of security concern as there can be much confidential data or mission-critical applications. In this paper, we propose Data Storage Lock Algorithm (DSLA) to store confidential data thereby provides secure data storage in cloud computing based on cryptographic standards.
APA, Harvard, Vancouver, ISO, and other styles
22

Bramhe, Manoj V., Dr Milind V. Sarode, and Dr Meenakshi S. Arya. "Secure Cloud Data Storage: From Single to Multi-Cloud Environment." International Journal of Research in Advent Technology 7, no. 2 (2019): 144–47. http://dx.doi.org/10.32622/ijrat.72201938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Abid, Tahera, Zahoora Abid, and Sushma Jaiswal. "Dynamic Bandwidth Reallocation for Enhanced Data Slice Distribution in Multi-Cloud Storage Environments." International Journal of Scientific Methods in Intelligence Engineering Networks 01, no. 09 (2023): 01–10. http://dx.doi.org/10.58599/ijsmien.2023.1901.

Full text
Abstract:
This article examines the advantages of employing many cloud platforms for data storage, alongside providing a comprehensive description of cloud computing. The significance of this matter is indisputable, considering the substantial duration required for the consolidation of such a vast amount of data into a singular cloud platform. When faced with a complex problem requiring significant time for resolution, it is advantageous to transfer a substantial amount of data across different cloud platforms. In addition to variations in transmission rates between different cloud providers, the size of Internet data packets employed by service providers may also play a factor in the transmission process. This study proposes an optimization approach to enhance data transfer and facilitate the optimal distribution of data packets when compared to a method that evenly distributed data across various clouds without considering optimal bandwidth allocation.
APA, Harvard, Vancouver, ISO, and other styles
24

Globa, Larysa, and Anton Kartashov. "OPTIMIZING DISTRIBUTED DATA STORAGE IN MULTI-CLOUD ENVIRONMENTS: ALGORITHMIC APPROACH." Information and Telecommunication Sciences, no. 2 (December 23, 2024): 4–12. https://doi.org/10.20535/2411-2976.22024.4-12.

Full text
Abstract:
Background. Multi-cloud environments present complex challenges in optimal resource allocation and provider selection. Previous research has established a comprehensive ontological model and evaluation criteria for distributed data storage, however efficient provider selection remains a significant challenge due to the dynamic nature of cloud services and the multitude of interdependent factors affecting performance and cost-effectiveness. Objective. The purpose of the paper is to develop and validate a sophisticated optimization function for cloud provider selection in multi-cloud environments, incorporating both Reinforcement Learning (RL) and Multi-Objective Evolutionary Algorithms (MOEAs) to address the complexity of provider selection while considering multiple competing objectives and constraints. Methods. The research employs an ontological approach to formalize domain concepts, relationships, and properties in multi-cloud environments. Additionally, an optimization function is developed incorporating multiple weighted criteria derived from the established ontological model. The study focuses on the implementation of the RL algorithm to adapt to dynamic changes in cloud provider characteristics and integration of MOEAs to handle multiple competing objectives as well as providing a comparative analysis with traditional selection methods and alternative optimization approaches for multi-cloud storage settings. Results. The proposed ontological model successfully formalizes the domain's concepts, relationships, and properties in multi-cloud environments. The optimization function demonstrates effectiveness in selecting the most suitable public cloud provider based on the proposed features, enhancing data management practices automation and decision-making processes. Conclusions. The developed optimization function and suggested methodology significantly advance the state-of-the-art in distributed multi-cloud data storage. The integration of RL and MOEAs provides a robust framework for addressing the complexity of multi-cloud environments while offering superior performance compared to existing approaches. The methodology successfully balances multiple objectives while adapting to dynamic changes in cloud provider characteristics.
APA, Harvard, Vancouver, ISO, and other styles
25

Rashid, Mustafa Noori, Leith Hamid Abed, and Waleed Kareem Awad. "Financial information security using hybrid encryption technique on multi-cloud architecture." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.

Full text
Abstract:
One of the most severe issues in the cloud is security. In comparison to financial data, so it is extremely sensitive and must be safeguarded against unwanted access. We have developed a proposed system based on three different keys. We divided the data into insensitive, sensitive, and highly sensitive data. The data will be saved on a separate cloud server. The proposed system used different keys for encryption and decryption purposes. The elliptic curve cryptography (ECC) based distributed cloud-based secure data storage (DDSPE) approach was proposed to provide secure large data based data protection across the different clouds. With DDSPE technology, the ECC scheme has been used for encryption and decryption purposes. The cloud is used for simulation. The results of the tests reveal that the suggested DDSPE system is safe and saves time regarding data retention and retrieval. To analyze performance, we compared the DDSPE method with advance encryption standard (AES), blowfish, rivest shamir adleman (RSA), security-aware efficient distributed storage (SA-EDS), and attribute based encryption (ABE) based secure distributed storage (ASDSS). In terms of information retention and recovery, our methodology is quite effective because it requires less amount of time as compared to other strategies.
APA, Harvard, Vancouver, ISO, and other styles
26

Mustafa, Noori Rashid, Hamid Abed Leith, and Kareem Awad Waleed. "Financial information security using hybrid encryption technique on multi-cloud architecture." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3450~3461. https://doi.org/10.11591/eei.v11i6.3967.

Full text
Abstract:
One of the most severe issues in the cloud is security. In comparison to financial data, so it is extremely sensitive and must be safeguarded against unwanted access. We have developed a proposed system based on three different keys. We divided the data into insensitive, sensitive, and highly sensitive data. The data will be saved on a separate cloud server. The proposed system used different keys for encryption and decryption purposes. The elliptic curve cryptography (ECC) based distributed cloud-based secure data storage (DDSPE) approach was proposed to provide secure large data based data protection across the different clouds. With DDSPE technology, the ECC scheme has been used for encryption and decryption purposes. The cloud is used for simulation. The results of the tests reveal that the suggested DDSPE system is safe and saves time regarding data retention and retrieval. To analyze performance, we compared the DDSPE method with advance encryption standard (AES), blowfish, rivest shamir adleman (RSA), security-aware efficient distributed storage (SA-EDS), and attribute based encryption (ABE) based secure distributed storage (ASDSS). In terms of information retention and recovery, our methodology is quite effective because it requires less amount of time as compared to other strategies.
APA, Harvard, Vancouver, ISO, and other styles
27

Mr., K. Rajkumar. "ANALYSIS OF MULTI-CLOUD ENVIRONMENT WITH SECURED FRAMEWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 8 (2016): 645–48. https://doi.org/10.5281/zenodo.60110.

Full text
Abstract:
Cloud computing associate rising technology with high cost data storages devices as well as the rapid rate for different cloud services such as Infrastructure as a service, software as a service, Platform as a Services. The cloud storage moves the user’s facts to large data centers which is remotely located. This paper proposes the Multi-cloud computing Architecture allow dynamic, efficient resource sharing among the cloud Service. Mechanisms for collaboration across multiple cloud service must undergo a rigorous, in-depth security analysis to find new threats and concerns resulting from collaboration. They must have the support of creative, systematic, and usable mechanisms that give effective security for data and applications. Without these provider-centric changes, current proposals don't give facilities for client-centric, on-the-fly, and expedient combos of heterogeneous cloud-based services.
APA, Harvard, Vancouver, ISO, and other styles
28

Xu, Kun, Weiwei Chen, and Yanan Zhang. "Blockchain-based Integrity Verification of Data Migration in Multi-cloud Storage." Journal of Physics: Conference Series 2132, no. 1 (2021): 012031. http://dx.doi.org/10.1088/1742-6596/2132/1/012031.

Full text
Abstract:
Abstract In the process of multi-cloud storage data migration, data integrity is vulnerable to corruption, but the existing data integrity verification schemes for data migration across clouds are not highly reliable. To address this problem, a blockchain-based data integrity verification scheme for migration across clouds is proposed in this paper. In this scheme, a blockchain network is used instead of a third-party auditor. For each migration, a multi-cloud broker will send an integrity verification request to blockchain at three different times, and a smart contract will verify the data integrity according to the RSA-based homomorphic verification tags. Then, the security of the scheme is analyzed. Finally, simulation experiments and tests are conducted on Ethereum, and the results show the feasibility of the scheme.
APA, Harvard, Vancouver, ISO, and other styles
29

Garima, Anand. "DATA SECURITY TECHNIQUE IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 538–44. https://doi.org/10.5281/zenodo.1402460.

Full text
Abstract:
Cloud computing is the delivery of computing services over the Internet. The platform of cloud computing gives peoples the opportunity of sharing and storing resources and information among the people across the globe. Most of organizations, individual and end users are making use of such online storage services to store their important information for the backup purpose. This new paradigm brings about many new security challenges. At present ensuring security in cloud computing platform has become one of the most significant concerns for the researchers. Many any new frameworks and technologies are used to preserve data that are stored in clouds. In this paper, a new data security scheme is developed for cloud computing platform. This scheme ensures data security in both the ways i.e., data storage security and data retrieval security. For data retrieval security, multi-level authorization technique is applied. Authenticity of user is done in 3 levels which includes registered key, one-time password (OTP) and image-based security mechanism. For data storage security, data partitioning is done along with the application of serialization concept. Both data retrieval security and data storage security provide a strong foundation that not only restricts the unauthorized user to access the data stored in cloud but also ensures the confidentiality and integrity of data.
APA, Harvard, Vancouver, ISO, and other styles
30

K L, Anitha, and T. R. Gopalakrishnan Nair. "Data storage lock algorithm with cryptographic techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3843. http://dx.doi.org/10.11591/ijece.v9i5.pp3843-3849.

Full text
Abstract:
<span>The cloud computing had its impact far and wide, and Enterprise solutions are getting migrated to different types of clouds. The services are delivered from the data centers which are located all over the world. As the data is roaming with less control in any data centers, data security issues in cloud are very challenging. Therefore we need multi-level authentication, data integrity, privacy and above all encryption to safeguard our data which is stored on to the cloud. The data and applications cannot be relocated to a virtual server without much degree of security concern as there can be much confidential data or mission-critical applications. In this paper, we propose Data Storage Lock Algorithm (DSLA) to store confidential data thereby provides secure data storage in cloud computing based on cryptographic standards.</span>
APA, Harvard, Vancouver, ISO, and other styles
31

Wenjun Luo, and Jianming Tan. "Multi-user Searchable Encryption in Cloud Storage." International Journal of Advancements in Computing Technology 5, no. 6 (2013): 1103–10. http://dx.doi.org/10.4156/ijact.vol5.issue6.129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kadam, Mandar, Stewyn Chaudhary, and Bony Carvalho. "Security Approach for Multi-Cloud Data Storage." International Journal of Computer Applications 126, no. 4 (2015): 27–31. http://dx.doi.org/10.5120/ijca2015906032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine, and Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes." International Journal of Information Security and Privacy 11, no. 1 (2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.

Full text
Abstract:
In cloud storage systems, data security management is becoming a serious matter. Big data and accessibility power is increasingly high, though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. As a result, cloud storage security has become one of the driving components in Cloud Computing regarding to data manipulation trust on both hosting center and on-transit. This paper proposes a TPM-Based Security over Multi-Cloud Storage Architecture (MCSA) grounded on Erasure Codes to apply root of trust based on hardware authenticity. An erasure codes such as Reed-Solomon, is capable of assuring stability in storage costs with best practice to guarantee data accessibility failure recovery. A Multi-Cloud Control Node manages other Control Nodes evolved in the cloud; this work introduces TPM-Based Security functions per Control node in the architecture. This concept will resolve a number of storage security issues, hence Cloud Computing adoption.
APA, Harvard, Vancouver, ISO, and other styles
34

Muthu Selvam, M., K. Mariappan, G. V. Sriramakrishnan, and G. Suseendran. "DeyPoS-homomorphism authenticated tree (HAT) for multi-user locality in cloud storage." International Journal of Engineering & Technology 7, no. 2.31 (2018): 141. http://dx.doi.org/10.14419/ijet.v7i2.31.13427.

Full text
Abstract:
The technology PoS (Dynamic Proof of storage) is a cryptographic primordial allows a abuser to test the reliability of subcontracted documents and effectively replace documents in the cloud storage system. Despite the fact that investigators have projected several dynamic proofs of storage designs in distinct client settings, hassle in the multi-client settings have now not been examined adequately. In sensible multi-client cloud server storage space wishes a cozy client part cross client system of deduplication, it permits client toward bypass importing manner as well as gain instantly the rights of the files, while different vendors of the same files hold uploaded to the cloud system server. In the direction of familiarity not a bit of prevailing dynamic Proof of Storages can guide this system. This research article we are bring the model of dynamic proof of storage in deduplicatable system and endorse a green creation known as Dedupicatable Dynamic Proof of Storage (DeyPoS), on the way to attain DeyPoS and comfy reduplication concurrently in cross client. Taking into account confront of formation assortment and personal blot creation make use of a new tool called HAT (Homomorphic Authenticated Tree). Also verify precautions of creation and the hypothetical, investigational outcomes shows that the creation is green in use.
APA, Harvard, Vancouver, ISO, and other styles
35

R. Vignesh, R. Vignesh, and J. Preethi R. Vignesh. "Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage." 網際網路技術學刊 23, no. 4 (2022): 811–25. http://dx.doi.org/10.53106/160792642022072304016.

Full text
Abstract:
<p>The revolutionary growth in the processing and storage mechanisms over the Internet has given the enhancement to inexpensive and strong computing properties. Cloud computing is a rising technology, which offers the data storage facility also application accessing facility in online environment. This system stands countless opportunities also challenges. In that, security of data and the increasing similar data in cloud (duplication) are very important issues to be addressed. So, Deduplication method is developed to reduce the similar data that is present in the storage system. In this paper, a novel technique is proposed to remove the duplicate data from cloud also help to save the bandwidth access and storage space. The experimental results demonstrate that the proposed system provide the more security for data in cloud storage and also overcomes the main drawbacks of the existing systems. In one-server storage and distributed storage systems, we have created a solution which provides data security and space efficacy. The chunk data generates encryption keys consistently; the same chunk is therefore always encrypted with the same chip text. In addition, the keys cannot be derived from the chunk data encrypted. Because the information to be accessed and decrypted by each user is encrypted by using a key known to the user alone, even a complete system breach cannot expose which chunks are utilised by which users.</p> <p> </p>
APA, Harvard, Vancouver, ISO, and other styles
36

Ms.Fathima, Zimarin1, Mohamed Faliyil V.F2 Mr., Najtha A.S3 Ms., Thasneem P.A4 Ms., and Shemitha P.A5 Ms. "EXPRESSIVE,EFFICIENT,AND REVOCABLE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE." International Journal of Advances in Engineering & Scientific Research 3, no. 6 (2016): 01–10. https://doi.org/10.5281/zenodo.10774421.

Full text
Abstract:
&nbsp; <strong>Abstract: </strong> &nbsp; Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Cipher text-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. In this paper, we design an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently. Specifically, we propose a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques to design the data access control scheme. Our attribute revocation method can efficiently achieve both forward security and backward security. The analysis and simulation results show that our proposed data access control scheme is secure in the random oracle model and is more efficient than previous works. <strong>Key words -</strong> Access control, multi-authority, CP-ABE, attribute revocation, cloud storage
APA, Harvard, Vancouver, ISO, and other styles
37

Pasupuleti, Syam Kumar. "Effective and secure data storage in multi-cloud storage architectures." International Journal of Information and Communication Technology 12, no. 1/2 (2018): 74. http://dx.doi.org/10.1504/ijict.2018.089023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Pasupuleti, Syam Kumar. "Effective and secure data storage in multi-cloud storage architectures." International Journal of Information and Communication Technology 12, no. 1/2 (2018): 74. http://dx.doi.org/10.1504/ijict.2018.10008899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Caceres, А., and L. Globa. "ANALYSIS OF DATA ACCESS APPROACHES IN A MULTI-CLOUD ENVIRONMENT." Radio Electronics, Computer Science, Control, no. 1 (April 10, 2025): 175–85. https://doi.org/10.15588/1607-3274-2025-1-16.

Full text
Abstract:
Context. A multi-cloud system is characterized by the sequential or simultaneous use of services from different cloud providers to run applications. Such a system is a preferred infrastructure for the vast majority of IT businesses today. Currently, there are various approaches to combining cloud platforms from multiple vendors. This article explores practical approaches to achieve multi-cloud interoperability, focusing on abstract data access between different cloud storage providersand multi-cloud computing resource allocation. Key technologies and methodologies for uninterrupted data management are presented, such as the use of multi-cloud storage gateways (using S3Proxy as an example), the implementation of data management platforms (Apache NiFi), and the use of cloud-agnostic libraries (Apache Libcloud). The paper highlights the advantages and disadvantages of the selected approaches and conducts experiments to determine the cost and performance of these strategies. The result of the research is to determine the cost and performance of different approaches to data access in multicloud environments.Objective. To investigate different approaches to multi-cloud data access and determine the most optimal in terms of cost and performance.Method. We propose the optimization of multi-cloud infrastructures based on experimental data. Experimental modeling includes empirical measurements of performance and comparison of storage costs. The determination of performance is basedon the measurement of data reading time and latency. The AWS S3 pricing model is used to estimate the cost. Optimization approaches are described, considering file sizes and data storage, combining the strengths of different multi-cloud approachesand dynamic switching between solutions. An algorithm for selecting multi-cloud approaches is proposed, which takes into account the criteria of cost and performance, as well as their priority.Results. The experiment yielded values for the cost of storing and downloading data of different sizes (100 GB, 1 TB, 10TB), and the performance of transferring files of different sizes (100 KB, 1 MB, 10 MB) for multi-cloud gateway technologies, data management platforms, and cloud-agnostic libraries. S3Proxy was found to have the fastest file access for large data volumes, while Apache Libcloud showed better value for smaller volumes. Both approaches significantly outperformed Apache NiFi. This study can contribute to the development of methods for efficient resource management in multi-cloud environments.Conclusions. The obtained results can assist in prioritizing the selection of these paradigms, aiding organizations in developing and deploying effective multi-cloud strategies. This approach enables them to leverage the distinctive features of each cloud provider while maintaining a unified, flexible, and efficient storage and computing environment.
APA, Harvard, Vancouver, ISO, and other styles
40

Liu, Hong Wei, Shu Lan Wang, and Peng Zhang. "Multiple-Replica Public Auditing Protocol for Cloud Storage." Applied Mechanics and Materials 513-517 (February 2014): 999–1004. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.999.

Full text
Abstract:
Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users data is owned by cloud service provider physically, and the physical boundary between two users data is fuzzy. Moreover, cloud storage provider stores multiple replicas of data in order to increase robustness of users data. The user is charged by the amount of replicas. However, the evidence cloud storage provider actually spends more storage space is scarce. In this environment, a method to ensure multi-replica integrity must be provided. In order to avoid retrieving enormous storage data and users themselves checking, a multi-replica public auditing protocol was proposed based on the BLS short signature scheme and the homomorphic hash function. Based on the computational Diffie-Hellman assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service provider. As the independence among blocks and block signatures, this protocol supports block-level dynamic update, including insertion, modification and deletion. So, the protocol is secure and efficient, and supports for multi-replica, public verification, dynamic update and privacy preserving.
APA, Harvard, Vancouver, ISO, and other styles
41

Indoria, Parul, and Abhishek Didel. "An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 12 (2013): 404–9. https://doi.org/10.5281/zenodo.14613552.

Full text
Abstract:
Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable computing needs grow. However, one of the most important challenges for the cloud as the backup and protection of data and processes information from users. Security of cloud computing environment is a new research area, the further development of both the associations of academic and industrial research. In order to create secure and reliable services in cloud computing environment is major concerning issue. This paper focuses more on the subject related to the securely resource sharing and privacy aspects in cloud computing environment, such as data integrity, data compromise, service availability. It proposes a new approach &ldquo;An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment&rdquo;. It is based on multi-cloud service providers and the secret sharing key with object oriented hierarchy. This approach mainly considers three clouds in which bursting and aggregation operation had been performed and includes many object oriented aspects based on some parameter were analyzed. We also used secure sharing mechanism so that the cloud resources are shared among different cloud environment.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
42

DINESH, N.THILLAI, and A.SELVA DEVI. "SECURED MULTI-TENANCY APPROVAL FOR DATA STORAGE IN CLOUD." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 06 (2015): 1837–40. https://doi.org/10.5281/zenodo.14786032.

Full text
Abstract:
Cloud Computing is a general term for delivery of hosted services over the internet. Cloud organization and institutions are increasingly driven to cloud computing as a way to increase functionality, lower cost and enhance convenience to user by making the service and resource availability anywhere there is an internet connection. With cloud computing, user have readily available a suite of application, feature, and infrastructure that would normally require significant investment if provide in the traditional in house computing environment.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
43

Shah, Richa, and Shatendra Kumar Dubey. "Multi User Authentication for Reliable Data Storage in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 82–89. http://dx.doi.org/10.32628/cseit2410138.

Full text
Abstract:
Today's digital environment, Multi-user authentication plays a crucial role in ensuring data integrity and confidentiality, emphasizing its importance of reliable and secure data storage in cloud computing environments. The exploration extends to the strategies for implementing secure multi-user authentication, encompassing aspects such as password policies, biometric verification, encryption, role-based access control (RBAC), and multi-factor authentication (MFA). The issue of reliable data storage is covered in further detail, on the importance of data availability and integrity. Real-world applications of multi-user authentication and reliable data storage are examine. The paper elucidates how these applications enhance overall security, mitigating risks associated with unauthorized access and cyber threats.The paper concludes by integration of multi-user authentication and reliable data storage is explored through considerations the critical role of multi-user authentication in ensuring reliable data storage in cloud computing such as secure API access, token-based authentication, and adherence to security best practices. Challenges in user authentication are addressed, with solutions proposed for seamless access across cloud platforms, including the adoption of Single Sign-On (SSO), multi-factor authentication, regular security audits, collaboration with cloud security experts, and user education and training. The synthesis of challenges, benefits, drawbacks, and implementation strategies provides organizations with a comprehensive guide for enhancing their data security measures.
APA, Harvard, Vancouver, ISO, and other styles
44

Indira, K., and R. Karthikeyan. "Performance Analysis and Optimization of Multi-Cloud Compuitng for Loosly Coupled MTC Applications." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 125–29. http://dx.doi.org/10.51983/ajcst-2012.1.1.1693.

Full text
Abstract:
Cloud storage enables network online storage where data is stored on multiple virtual servers. In order to carry out huge tasks in cloud environment, single cloud provider is not sufficient to perform the many tasks applications and services. For Handling Intensive task, need to have multi cloud environment to improve the cost-effectiveness of the deployment and increase availability. Larger tasks are carried out by processing of many tasks at a time in a cloud computing environment. In this paper, for efficient handling of multiple tasks, need to have the performance analysis and optimization of all tasks in the multi-cloud environment. Performance analyses consist of CPU scheduling, Memory utilization, I/O tasks, and resource time sharing and cost benefits. Earlier system concentrates on the deployment of multi cloud architecture and multi-processing needs more accuracy, scalability and efficiency. In the methodology, Job allocation by front end server and service LAN are used. This research will achieved the process of multitasking environment in multi cloud infrastructure by having some effective tools for measuring over all performance and optimization of multi cloud computing services.
APA, Harvard, Vancouver, ISO, and other styles
45

Caceres, Anton, and Larysa Globa. "AHP-based multi-criteria analysis of multi-cloud data management techniques." Radioelectronic and Computer Systems 2025, no. 1 (2025): 58–70. https://doi.org/10.32620/reks.2025.1.04.

Full text
Abstract:
Today, the multi-cloud concept covers more and more spheres of modern life: tech-related industries, financial services, healthcare, etc. A multi-cloud environment combines services from different providers through a specific user-side architecture. The aviation industry has several characteristics: large-scale modeling, testing, and managing vast data. Running complex simulations is time-consuming and requires significant high-performance computing (HPC) resources. This, in turn, makes using multi-cloud very promising in this industry. However, currently, there are many approaches to multi-cloud interaction, each of which has its own characteristics. The article researches different approaches to multi-cloud data access and create a model to determine the most optimal one. The research subject is interaction methods in multi-cloud systems: Multi-cloud data storage gateways using the example of S3Proxy, data management platforms using the example of Apache NiFi, and cloud-agnostic libraries using the example of Apache Libcloud. Their main advantages, disadvantages, and features of use are given. The research tasks are formalizing the problem, defining cost, performance, security, and implementation effort parameters for each approach, and developing a multi-criteria decision analysis (MCDA) model using the Analytical Hierarchy Process (AHP) method. Thanks to its adaptability, this model allows organizations to choose the most effective strategy for integrating multi-cloud technologies into their work processes, maximizing potential benefits, regardless of the specific context. The following results were obtained. The MCDA/AHP model was built with the input parameters of performance, security, storage cost, and implementation effort determined. In this case, performance was found empirically, cost was based on the AWS S3 pricing model, implementation efforts were estimated based on expert opinion, and the security criterion was determined using the weighted scoring method. It is important to note that the cost, performance, security, and implementation complexity criteria are ranked in descending order of importance and play a crucial role in obtaining the initial values. Cloud-agnostic libraries achieved the best results, followed by multi-cloud storage gateways and data management platforms. Conclusions. The scientific novelty of this work is the development of a multi-criteria model for determining the most optimal multi-cloud approach. The limitations and opportunities of MCDA/AHP are also described. This not only helps to determine the best approach for specific requirements but also lays a solid foundation for further research and development of strategies for the use of multi-cloud environments in various industries, paving the way for future advancements in the field.
APA, Harvard, Vancouver, ISO, and other styles
46

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in multi-clouds; one at the client side, and other at the server side. The article presented a security domination outline for multi-clouds and supports security needs like Confidentiality, Integrity, Availability, Authorization, and Non-repudiation for cloud storage. Through this document we have anticipated, HBDaSeC, a secure-computation protocol to ease the challenges of enforcing the protection of data for information security in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
47

Emily, R. Walker. "Hybrid Cloud Architectures for Scalable and Secure Data Storage." International Journal of Innovative Computer Science and IT Research 01, no. 02 (2025): 12–23. https://doi.org/10.5281/zenodo.15147313.

Full text
Abstract:
As far as the requirements of scalable and secure data storage solutions in the past&nbsp;few years are concerned, their requirements have always remained a top concern for businesses&nbsp;with an increasing amount of data to deal with. Hybrid cloud architectures, providing private&nbsp;and public cloud infrastructure, possess a promising solution towards scalability, flexibility,&nbsp;and increased security. This paper is an examination of the building blocks of hybrid cloud&nbsp;systems with regard to their ability to support scalable data storage as well as deal with the issue&nbsp;of security. We examine the different elements of hybrid cloud storage, such as the combination&nbsp;of public and private clouds, and how this can improve performance and security. We also&nbsp;address the security features of hybrid clouds, such as data encryption, compliance, and access&nbsp;control, and cite industry-specific examples. The paper also touches on the challenges&nbsp;organizations will encounter in deploying hybrid cloud solutions and emerging trends such as&nbsp;AI and edge computing that will shape the future of hybrid cloud data storage. Finally, the paper&nbsp;seeks to offer insights regarding how hybrid cloud infrastructures may transform data storage&nbsp;solutions for enterprises in a manner that will efficiently manage increasing data while&nbsp;maintaining adequate security.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
48

Pasupuleti, Murali Krishna. "Secure Multi-Tenant Cloud Storage with Homomorphic Encryption." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 362–71. https://doi.org/10.62311/nesx/rphcrcscrcec5.

Full text
Abstract:
Abstract: Multi-tenant cloud environments present significant security challenges, particularly when handling sensitive data for diverse clients. This study proposes a secure storage architecture utilizing homomorphic encryption (HE) to allow computations on encrypted data while preserving privacy and tenant isolation. The system integrates role-based access control and policy-driven query interfaces to ensure confidentiality and secure access. A simulated multi-tenant environment was used to evaluate performance, measuring latency, throughput, ciphertext overhead, and inter-tenant data leakage. Regression and predictive analysis revealed that ciphertext size and computation depth significantly impact performance metrics. The proposed solution demonstrated an 87% accuracy in encrypted query prediction with negligible leakage, proving that homomorphic encryption can support secure, scalable multi-tenant cloud storage. Keywords Homomorphic Encryption, Multi-Tenant Cloud, Data Privacy, Secure Storage, Confidential Computing, Access Control
APA, Harvard, Vancouver, ISO, and other styles
49

A, SIVANRAJA. "A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30479.

Full text
Abstract:
The advent of network storage services has revolutionized user experiences worldwide, offering unparalleled convenience, cost-effectiveness, and robust availability. However, relying solely on a single service provider entails inherent risks. To address this, sophisticated multi-cloud storage systems have emerged, aiming to mitigate data corruption risks. Nevertheless, ensuring data integrity in such systems necessitates robust auditing schemes. Traditional approaches often depend on centralized entities like third-party auditors (TPAs) or cloud service organizers, leaving users vulnerable to malicious actors during disputes. In response, we propose a blockchain-based multi-cloud storage auditing framework. By leveraging blockchain technology, we establish an immutable ledger to record interactions among users, service providers, and organizers, serving as indisputable evidence. Smart contracts are employed to detect and resolve service disputes, compelling untrusted organizers to accurately identify malicious providers. Additionally, we utilize blockchain networks and homomorphic verifiable tags to facilitate low-cost batch verification without the need for TPAs. Theoretical analyses and empirical evaluations demonstrate the scheme's efficacy and cost-effectiveness in multi-cloud environments, promising enhanced data integrity and dispute resolution mechanisms. Keywords—Multi-cloud storage, blockchain, data auditing, dispute arbitration
APA, Harvard, Vancouver, ISO, and other styles
50

S. Raj, Dr Jennifer. "EFFICIENT INFORMATION MAINTENANCE USING COMPUTATIONAL INTELLIGENCE IN THE MULTI-CLOUD ARCHITECTURE." Journal of Soft Computing Paradigm 2019, no. 2 (2019): 113–24. http://dx.doi.org/10.36548/jscp.2019.2.006.

Full text
Abstract:
The multi cloud architecture improvises the constancy of the system associated with the cloud computing as they offer benefits such as the reducing the severity of the vendor lock in, which is the major impediment to the cloud service adoption. However the information maintenance in the multi cloud architecture is a very tedious and challenging as it inherits multitudes of complexity due to various services rendered, interfaces and technologies used. As storage is the fundamental usage of the cloud computing, the failures in the information maintenance (storage, securing, retrieval) in the traditional cloud computing has led to the development of different techniques that are highly reliable and flexible. The paper also scope in developing one such adaptable and highly secure information maintenance using the Cryptography integrated Computational intelligence (CICI) for application deployment in the multi cloud architecture. The proposed method is validated using the network simulator –Two, to verify the performance augmentation of the multi-cloud architecture in its information maintenance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!