SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290
2338
A Framework for Multicloud Environment
Services
Dr. C S. Pillai
Associate .Professor & HOD,ACS College OF Engineering, Bangalore.
Email : Pillai.cs5@gmail.com
----------------------------------------------------------------ABSTRACT-----------------------------------------------------------------
The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services
without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers,
Infrastructure / resource providers, and service users (or clients). They include applications delivered as services, as well
as the hardware and software systems providing these services. Our proposed framework for generic cloud collaboration
allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. This
framework supports universal and dynamic collaboration in a multicloud system. It lets clients simultaneously use
services from multiple clouds without prior business agreements among (CSP) cloud service providers, and without
adopting common standards and specifications.
KEYWORDS: cloud clients, cloud service provider, applications delivered as services.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: October 18, 2014 Date of Acceptance: December 01, 2014
--------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
Cloud computing characteristics include a ubiquitous
(network-based) access channel; resource pooling;
multitenancy, automatic and elastic provisioning and
release of computing capabilities; and metering of
resource usage (typically on a pay-per-use basis).
Virtualization of resources such as processors, network,
memory, and storage ensures scalability and high
availability of computing capabilities. Clouds can
dynamically provision these virtual resources to hosted
applications or to clients that use them to develop their
own applications or to store data. Rapid provisioning and
dynamic reconfiguration of resources help cope with
variable demand and ensure optimum resource utilization.
As more organizations adopt cloud computing, cloud
service providers (CSPs) are developing new technologies
to enhance the cloud’s capabilities. Cloud mash-ups are a
recent trend; mashups combine services from multiple
clouds into a single service or application, possibly with
on-premises (client-side) data and services. This service
composition lets CSPs offer new functionalities to clients
at lower development costs.
Collaboration among multiple cloud-based services, like
cloud mashups, opens up opportunities for CSPs to offer
more-sophisticated services that will benefit the next
generation of clients.
A proposed proxy-based multicloud computing
framework allows dynamic, on-the-fly collaborations and
resource sharing among cloud-based services, A proposed
proxy-based multicloud computing framework allows
dynamic, on the-addressing trust, policy, and privacy
issues without preestablished collaboration agreements or
standardized interfaces.
With cloud computing initiatives, the scope of insider
threats, a major source of data theft and privacy breaches,
is no longer limited to the organizational perimeter
2. PRESENT SYSTEM AND PROBLEMS
Many existing cloud data services provide similar access
control models, in which individual and organizational
privacy, a key requirement for digital identity
management, is unprotected. Also, with cloud computing
initiatives, the scope of insider threats, a major source of
data theft and privacy breaches, is no longer limited to the
organizational perimeter. Multicloud environments
exacerbate these issues because proxies can access data
(which the environment might dynamically move or
partition across different clouds) on behalf of clients.
Revealing sensitive information in identity attributes to
proxies that grant them authorization to access the data on
behalf of clients is not an attractive solution. Thus,
assuring the private and consistent management of
information relevant to ABAC becomes more complex in
multicloud systems.
• Increase in the attack surface due to system
complexity,
• Loss of client’s control over resources and data due
to asset migration,
• Threats that target exposed interfaces due to data
storage in public domains, and
• Data privacy concerns due to multitenancy
3. MULTICLOUD COMPUTING FRAMEWORK
Multi-Cloud computing has many advantages such as it
provides usage of data from various clouds, the ability of
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290
2339
choice for the user, stops vendor lock-in and
synchronization between different cloud service providers
with cost optimization. The main issue in implementing
multi-cloud is its working in a distributed environment as
the services are to be collaborated with different cloud
service providers to make it possible a framework is laid
in the research work of “Collaboration Framework for
Multi-cloud Systems” [6] which specify the use of proxies
at different level of collaboration. These proxies can be
implemented by the cloud service provider or can be set
by the institutionsorganization so as to gain service from
collaborated service providers. These proxies can also be
used to have a secure communication between the client
and the service provider. To protect data at rest and data
in transit, proxies must provide a trusted computing
platform that prevents malicious software from taking
control and compromising sensitive client and cloud
application data [6]. This also deals with the security
aspect of the cloud computing. The cloud services have
been classified as software as a service (SaaS), Platform
as a service (PaaS) and Infrastructure as a Service (IaaS)
it becomes important that the cloud service providers
must be able to provide these services on distributed
environment of multi-cloud for that purpose research
work of “A Federated Multi-Cloud PaaS Infrastructure”
[4] can be effective as it provides a platform for various
services to be provides in a collaborated paradigm. It is
also important that the cost effectiveness of multi-cloud
must be considered before shifting towards a new
paradigm to solve this issue research work of “Cloud
Brokering Algorithm” [10] has given an algorithm based
on the Virtual infrastructure in cloud environment which
will effectively determine the allocation of VM both on
static and dynamic basis. This paper is based on review of
the technique that will proof to be efficient while shifting
towards the multi-cloud environment. All the factor
included in this paper are the research work done in the
fields which are the major concern whenever a new
technology is to be implemented it includes the
framework, platform for new technology to be
implemented and the cost effectiveness on the side of the
consumer.
3.1 Cloud hosted proxy
As Figure 1.1 shows, each CSP can host proxies within its
cloud infrastructure, manage all proxies within its
administrative domain, and handle service requests from
clients that wish to use those proxies for collaboration.
The proxy instances might need to be
CSP specific. For example, in Figure 1.1, both C1 and C2
might mutually and dynamically provision sharing and
collaboration logic as proxy virtual instances within their
respective administrative domains.
Figure1.1:Cloud-hosted-proxy
3.2 Proxy as a service
Figure1.2: Proxy as a service
As Figure 1.2 shows, this scenario involves deploying
proxies as an autonomous cloud that offers collaborative
services to clients and CSPs. A group of CSPs that are
willing to collaborate can manage this proxy-as-a-service
cloud, or a third-party entity, a proxy service provider
(PSP), can provide management. Clients directly
subscribe to the proxy cloud service and employ them for
inter cloud collaboration.
4. GENERIC CLOUD COLLABORATION
Our proposed framework for generic cloud collaboration
allows clients and cloud applications to simultaneously
use services from and route data among multiple clouds.
This framework supports universal and dynamic
collaboration in a multicloud system. It lets clients
simultaneously use services from multiple clouds without
prior business agreements among cloud providers, and
without adopting common standards and specifications.
As more organizations adopt cloud computing, cloud
service providers (CSPs) are developing new technologies
to enhance the cloud’s capabilities. Cloud mashups are a
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290
2340
recent trend; mashups combine services from multiple
clouds into a single service or application, possibly with
on-premises (client-side) data and services. This service
composition lets CSPs offer new functionalities to clients
at lower development costs.
The proposed framework includes refining the proxy
deployment scenarios and development of infrastructural
and operational components of a multicloud system. This
must be accompanied by implementation of an
experimental platform using open source tools and
libraries. Enhance id management protocol framework for
more authentication. user centric identity management
and is being considered as a complete all-round solution
addressing all possible issues of cloud IDMs.
5. IMPLEMENTATION
After careful analysis the system has been identified to
have the following
• Collaboration Framework For Multicloud System
• Client/Users
• Cloud Service Provider
• Proxy Service Provider
• Collaboration Framework For Multicloud System :
Cloud collaboration allows clients and cloud applications
to simultaneously use services from and route data among
multiple clouds. This framework supports universal and
dynamic collaboration in a multicloud system. It lets
clients simultaneously use services from multiple clouds
without prior business agreements among cloud
providers, and without adopting common standards and
specifications.
• Client/Users :
Client sends a request to cloud C1, which dynamically
discovers the need to use services from clouds C2 and C3.
C1 employs proxies to manage these interactions. A client
that wishes to simultaneously use services from multiple
clouds must individually interact with each cloud service,
gather intermediate results, process the collective data,
and generate final results. Proxies can facilitate
collaboration without requiring prior agreements between
the cloud service providers. First, the requesting entity
chooses proxies to act on its behalf and to interact with
cloud applications. A client or a CSP might employ
multiple proxies to interact with multiple CSPs. It can
select proxies based on, for example, latencies between
proxies and clouds or workload conditions at various
proxies.
• Cloud Service Provider :
Cloud service providers (CSPs) deploy proxies as an
autonomous cloud system and offer it as a service to
clients. A client employs two proxies to interact with
CSPs C1 and C2. Alternatively, a client initiates a service
request with C1, which then discovers the need for a
service from C2. PSP: proxy service provider. Clients
deploy proxies within the infrastructure of their
organization. A client employs two proxies to interact
with CSPs C1 and C2. A client initiates a service request
with C1, which then discovers the need for a service from
C2.
• Proxy Service Provider :
It involves deploying proxies as an autonomous cloud that
offers collaborative services to clients and CSPs. A group
of CSPs that are willing to collaborate can manage this
proxy-as-a-service cloud, or a third-party entity, a proxy
service provider (PSP), can provide management. Clients
directly subscribe to the proxy cloud service and employ
them for intercloud collaboration. To protect data at rest
and data in transit, proxies must provide a trusted
computing platform that prevents malicious software from
taking control and compromising sensitive client and
cloud application data.
Fig 1.3 Owner uploads file
Fig 1.4 Uploaded file can be viewed
Fig 1.5 New service level agreement
Fig 1.6 New service level agreement successful
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290
2341
Fig 1.7 File requested by user ‘b’ is successful
Fig 1.8 File requested by user ‘a’ is successful
6. CONCLUSION
The platform on which the services are to be shared and at
last the market point of view that is its cost effectiveness
compared to the available. The multi-cloud environment
can end the vendor lock-in of the consumer which is
attained in the single cloud. The major area of concern in
this field is the agreement between the cloud service
providers for collaboration of their services in multi-
cloud. The consumer will get highly benefited with multi-
cloud environment and obtain service based on his
preferences and requirement and not based on his cloud
service provider.
A secure multicloud computing which provides
collaboration between clouds and gives the user
opportunity to download the files from different cloud
that is present. This also provides the security to the
user’s password and also to the files and data present in
the cloud.
7. FUTURE ENHANCEMENT
Cloud computing is new and growing very quickly, but
because security issues are still delaying its adoption, we
need to provide security mechanisms to ensure that cloud
computing benefits are fully realized and utilized.
Although there are many advantages to using a cloud-
based system, practical problems remain that have to be
solved before the technology can be more fully deployed,
particularly those problems related to service level
agreements, security, privacy, and power efficiency.
8. BIBLIOGRAPHY
[1]. P. Mell and T. Grance, The NIST Definition of
Cloud Computing,special publication 800-145, Nat’l
Inst. Standards and Technology, 2011
[2]. D. Bernstein and D. Vij, “Intercloud Security
Considerations,”Proc. 2nd Int’l Conf. Cloud
Computing (CloudCom 10), IEEE Press, 2010, pp.
537-544.
[3]. R. Buyya et al., “Market-Oriented Cloud
Computing: Vision,Hype, and Reality of Delivering
Computing as the 5th Utility,”Proc. 9th IEEE/ACM
Int’l Symp. Cluster Computing and the Grid
(CCGRID 09), IEEE CS, 2009, pp. 599-616.
[4]. B. Rochwerger et al., “Reservoir—When One Cloud
Is Not Enough,” Computer, Mar. 2011, pp. 44-51.
[5]. M.P. Papazoglou and W. van den Heuvel,
“Blueprinting the Cloud,” IEEE Internet Computing,
Nov./Dec 2011, pp. 74-79.
[6]. S. Ortiz Jr., “The Problem with Cloud Computing
Standardization,”Computer, July 2011, pp. 13-16.
[7]. P. Mell and T. Grance, “Perspectives on Cloud
Computing and Standards, NIST Information
Technology Laboratory,”Nat’l Inst. Standards and
Technology, 2008;
http://csrc.nist.gov/groups/SMA/ispab/documents/m
inutes/2008-12/cloudcomputing-standards_ISPAB-
Dec2008_P-Mell.pdf.
[8]. W. Jansen and T. Grance, Guidelines on Security
and Privacy in Public Cloud Computing, special
publication 800-144,Nat’l Inst. Standards and
Technology, 2011, p. x + 70.
[9]. S. Chandrasekhar et al., “Efficient Proxy Signatures
Based on Trapdoor Hash Functions,” IET
Information Security,Dec. 2010, pp. 322-332.
[10]. C.M. Ellison et al., SPKI Certificate Theory, IETF
RFC 2693,Sept. 1999; www.ietf.org/rfc/rfc2693.txt.
[11]. E. Hammer-Lahav, ed., The OAuth 1.0 Protocol,
IETF RFC 5849, Apr. 2010;
http://tools.ietf.org/html/rfc5849.
[12]. Y. Zhang and J.B.D. Joshi, “Access Control and
Trust Management for Emerging Multidomain
Environments,” An .Emerging Research in
Information Assurance, Security and Privacy
Services, Emerald Group Publishing, 2009, pp.421-
452.
[13]. J. Jin et al., “Patient-Centric Authorization
Framework for Electronic Healthcare Services,”
Computers & Security,Mar.-May 2011, pp. 116-
127.
[14]. R. Wu, G.J. Ahn, and H. Hu, “Towards HIPAA-
Compliant Healthcare Systems,” Proc. 2nd ACM
Int’l Symp. Health Informatics (IHI 12), ACM,
2012, pp. 593-602.
[15]. N.R. Adam and J.C. Wortmann, “Security-Control
Methods for Statistical Databases: A Comparative
Study,” ACM ComputingSurveys, Mar. 1989, pp.
515-556.
[16]. L. Xiong, S. Chitti, and L. Liu, “Preserving Data
Privacy in Outsourcing Data Aggregation Services,”
ACM Trans. Internet Technology, Aug. 2007, p. 17.
[17]. D.J. Abadi, S. Madden, and M. Ferreira,
“Integrating Compression and Execution in
Column-Oriented Database Systems,” Proc. ACM
SIGMOD Int’l Conf. Management ofData
(SIGMOD 06), ACM, 2006, pp. 671-682.

Más contenido relacionado

La actualidad más candente

A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeYogeshIJTSRD
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR... COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...Nexgen Technology
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
 
Winds of change from vendor lock in to the meta cloud
Winds of change from vendor lock in  to the meta cloudWinds of change from vendor lock in  to the meta cloud
Winds of change from vendor lock in to the meta cloudIEEEFINALYEARPROJECTS
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsVijay Karan
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
 
Winds of change from vendor lock-in to meta cloud review 1
Winds of change from  vendor lock-in to meta cloud review 1Winds of change from  vendor lock-in to meta cloud review 1
Winds of change from vendor lock-in to meta cloud review 1NAWAZ KHAN
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
Efficient Resource Sharing In Cloud Using Neural Network
Efficient Resource Sharing In Cloud Using Neural NetworkEfficient Resource Sharing In Cloud Using Neural Network
Efficient Resource Sharing In Cloud Using Neural NetworkIJERA Editor
 

La actualidad más candente (17)

A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System Uptime
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
B03410609
B03410609B03410609
B03410609
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR... COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 
Winds of change from vendor lock in to the meta cloud
Winds of change from vendor lock in  to the meta cloudWinds of change from vendor lock in  to the meta cloud
Winds of change from vendor lock in to the meta cloud
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
Winds of change from vendor lock-in to meta cloud review 1
Winds of change from  vendor lock-in to meta cloud review 1Winds of change from  vendor lock-in to meta cloud review 1
Winds of change from vendor lock-in to meta cloud review 1
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Efficient Resource Sharing In Cloud Using Neural Network
Efficient Resource Sharing In Cloud Using Neural NetworkEfficient Resource Sharing In Cloud Using Neural Network
Efficient Resource Sharing In Cloud Using Neural Network
 

Destacado

Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Eswar Publications
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachEswar Publications
 
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Eswar Publications
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
 
Information-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upInformation-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upEswar Publications
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
 
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear PairingsAn Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear PairingsEswar Publications
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...Eswar Publications
 
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...Eswar Publications
 
Diagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through ImagesDiagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through ImagesEswar Publications
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDESEswar Publications
 
An Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSNAn Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSNEswar Publications
 
Effective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LANEffective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LANEswar Publications
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...Eswar Publications
 
Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Eswar Publications
 
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsEswar Publications
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...Eswar Publications
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...Eswar Publications
 

Destacado (19)

Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
 
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
Information-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upInformation-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks up
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear PairingsAn Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
 
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
 
Diagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through ImagesDiagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through Images
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
An Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSNAn Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSN
 
Effective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LANEffective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LAN
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
 
Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...
 
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
 

Similar a A Framework for Multicloud Environment Services

Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...IEEEGLOBALSOFTTECHNOLOGIES
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelHitesh Mohapatra
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!imogokate
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
 
Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Job Placement and Staffing VA
Job Placement and Staffing VAJob Placement and Staffing VA
Job Placement and Staffing VAIntellectualpoint
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingIOSR Journals
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingINFOGAIN PUBLICATION
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 

Similar a A Framework for Multicloud Environment Services (20)

Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Sem rep edited
Sem rep editedSem rep edited
Sem rep edited
 
Job Placement and Staffing VA
Job Placement and Staffing VAJob Placement and Staffing VA
Job Placement and Staffing VA
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud Computing
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud Computing
 
F1034047
F1034047F1034047
F1034047
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 

Más de Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

Más de Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

A Framework for Multicloud Environment Services

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290 2338 A Framework for Multicloud Environment Services Dr. C S. Pillai Associate .Professor & HOD,ACS College OF Engineering, Bangalore. Email : Pillai.cs5@gmail.com ----------------------------------------------------------------ABSTRACT----------------------------------------------------------------- The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers, Infrastructure / resource providers, and service users (or clients). They include applications delivered as services, as well as the hardware and software systems providing these services. Our proposed framework for generic cloud collaboration allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. This framework supports universal and dynamic collaboration in a multicloud system. It lets clients simultaneously use services from multiple clouds without prior business agreements among (CSP) cloud service providers, and without adopting common standards and specifications. KEYWORDS: cloud clients, cloud service provider, applications delivered as services. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: October 18, 2014 Date of Acceptance: December 01, 2014 -------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION Cloud computing characteristics include a ubiquitous (network-based) access channel; resource pooling; multitenancy, automatic and elastic provisioning and release of computing capabilities; and metering of resource usage (typically on a pay-per-use basis). Virtualization of resources such as processors, network, memory, and storage ensures scalability and high availability of computing capabilities. Clouds can dynamically provision these virtual resources to hosted applications or to clients that use them to develop their own applications or to store data. Rapid provisioning and dynamic reconfiguration of resources help cope with variable demand and ensure optimum resource utilization. As more organizations adopt cloud computing, cloud service providers (CSPs) are developing new technologies to enhance the cloud’s capabilities. Cloud mash-ups are a recent trend; mashups combine services from multiple clouds into a single service or application, possibly with on-premises (client-side) data and services. This service composition lets CSPs offer new functionalities to clients at lower development costs. Collaboration among multiple cloud-based services, like cloud mashups, opens up opportunities for CSPs to offer more-sophisticated services that will benefit the next generation of clients. A proposed proxy-based multicloud computing framework allows dynamic, on-the-fly collaborations and resource sharing among cloud-based services, A proposed proxy-based multicloud computing framework allows dynamic, on the-addressing trust, policy, and privacy issues without preestablished collaboration agreements or standardized interfaces. With cloud computing initiatives, the scope of insider threats, a major source of data theft and privacy breaches, is no longer limited to the organizational perimeter 2. PRESENT SYSTEM AND PROBLEMS Many existing cloud data services provide similar access control models, in which individual and organizational privacy, a key requirement for digital identity management, is unprotected. Also, with cloud computing initiatives, the scope of insider threats, a major source of data theft and privacy breaches, is no longer limited to the organizational perimeter. Multicloud environments exacerbate these issues because proxies can access data (which the environment might dynamically move or partition across different clouds) on behalf of clients. Revealing sensitive information in identity attributes to proxies that grant them authorization to access the data on behalf of clients is not an attractive solution. Thus, assuring the private and consistent management of information relevant to ABAC becomes more complex in multicloud systems. • Increase in the attack surface due to system complexity, • Loss of client’s control over resources and data due to asset migration, • Threats that target exposed interfaces due to data storage in public domains, and • Data privacy concerns due to multitenancy 3. MULTICLOUD COMPUTING FRAMEWORK Multi-Cloud computing has many advantages such as it provides usage of data from various clouds, the ability of
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290 2339 choice for the user, stops vendor lock-in and synchronization between different cloud service providers with cost optimization. The main issue in implementing multi-cloud is its working in a distributed environment as the services are to be collaborated with different cloud service providers to make it possible a framework is laid in the research work of “Collaboration Framework for Multi-cloud Systems” [6] which specify the use of proxies at different level of collaboration. These proxies can be implemented by the cloud service provider or can be set by the institutionsorganization so as to gain service from collaborated service providers. These proxies can also be used to have a secure communication between the client and the service provider. To protect data at rest and data in transit, proxies must provide a trusted computing platform that prevents malicious software from taking control and compromising sensitive client and cloud application data [6]. This also deals with the security aspect of the cloud computing. The cloud services have been classified as software as a service (SaaS), Platform as a service (PaaS) and Infrastructure as a Service (IaaS) it becomes important that the cloud service providers must be able to provide these services on distributed environment of multi-cloud for that purpose research work of “A Federated Multi-Cloud PaaS Infrastructure” [4] can be effective as it provides a platform for various services to be provides in a collaborated paradigm. It is also important that the cost effectiveness of multi-cloud must be considered before shifting towards a new paradigm to solve this issue research work of “Cloud Brokering Algorithm” [10] has given an algorithm based on the Virtual infrastructure in cloud environment which will effectively determine the allocation of VM both on static and dynamic basis. This paper is based on review of the technique that will proof to be efficient while shifting towards the multi-cloud environment. All the factor included in this paper are the research work done in the fields which are the major concern whenever a new technology is to be implemented it includes the framework, platform for new technology to be implemented and the cost effectiveness on the side of the consumer. 3.1 Cloud hosted proxy As Figure 1.1 shows, each CSP can host proxies within its cloud infrastructure, manage all proxies within its administrative domain, and handle service requests from clients that wish to use those proxies for collaboration. The proxy instances might need to be CSP specific. For example, in Figure 1.1, both C1 and C2 might mutually and dynamically provision sharing and collaboration logic as proxy virtual instances within their respective administrative domains. Figure1.1:Cloud-hosted-proxy 3.2 Proxy as a service Figure1.2: Proxy as a service As Figure 1.2 shows, this scenario involves deploying proxies as an autonomous cloud that offers collaborative services to clients and CSPs. A group of CSPs that are willing to collaborate can manage this proxy-as-a-service cloud, or a third-party entity, a proxy service provider (PSP), can provide management. Clients directly subscribe to the proxy cloud service and employ them for inter cloud collaboration. 4. GENERIC CLOUD COLLABORATION Our proposed framework for generic cloud collaboration allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. This framework supports universal and dynamic collaboration in a multicloud system. It lets clients simultaneously use services from multiple clouds without prior business agreements among cloud providers, and without adopting common standards and specifications. As more organizations adopt cloud computing, cloud service providers (CSPs) are developing new technologies to enhance the cloud’s capabilities. Cloud mashups are a
  • 3. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290 2340 recent trend; mashups combine services from multiple clouds into a single service or application, possibly with on-premises (client-side) data and services. This service composition lets CSPs offer new functionalities to clients at lower development costs. The proposed framework includes refining the proxy deployment scenarios and development of infrastructural and operational components of a multicloud system. This must be accompanied by implementation of an experimental platform using open source tools and libraries. Enhance id management protocol framework for more authentication. user centric identity management and is being considered as a complete all-round solution addressing all possible issues of cloud IDMs. 5. IMPLEMENTATION After careful analysis the system has been identified to have the following • Collaboration Framework For Multicloud System • Client/Users • Cloud Service Provider • Proxy Service Provider • Collaboration Framework For Multicloud System : Cloud collaboration allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. This framework supports universal and dynamic collaboration in a multicloud system. It lets clients simultaneously use services from multiple clouds without prior business agreements among cloud providers, and without adopting common standards and specifications. • Client/Users : Client sends a request to cloud C1, which dynamically discovers the need to use services from clouds C2 and C3. C1 employs proxies to manage these interactions. A client that wishes to simultaneously use services from multiple clouds must individually interact with each cloud service, gather intermediate results, process the collective data, and generate final results. Proxies can facilitate collaboration without requiring prior agreements between the cloud service providers. First, the requesting entity chooses proxies to act on its behalf and to interact with cloud applications. A client or a CSP might employ multiple proxies to interact with multiple CSPs. It can select proxies based on, for example, latencies between proxies and clouds or workload conditions at various proxies. • Cloud Service Provider : Cloud service providers (CSPs) deploy proxies as an autonomous cloud system and offer it as a service to clients. A client employs two proxies to interact with CSPs C1 and C2. Alternatively, a client initiates a service request with C1, which then discovers the need for a service from C2. PSP: proxy service provider. Clients deploy proxies within the infrastructure of their organization. A client employs two proxies to interact with CSPs C1 and C2. A client initiates a service request with C1, which then discovers the need for a service from C2. • Proxy Service Provider : It involves deploying proxies as an autonomous cloud that offers collaborative services to clients and CSPs. A group of CSPs that are willing to collaborate can manage this proxy-as-a-service cloud, or a third-party entity, a proxy service provider (PSP), can provide management. Clients directly subscribe to the proxy cloud service and employ them for intercloud collaboration. To protect data at rest and data in transit, proxies must provide a trusted computing platform that prevents malicious software from taking control and compromising sensitive client and cloud application data. Fig 1.3 Owner uploads file Fig 1.4 Uploaded file can be viewed Fig 1.5 New service level agreement Fig 1.6 New service level agreement successful
  • 4. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2338-2341 (2014) ISSN : 0975-0290 2341 Fig 1.7 File requested by user ‘b’ is successful Fig 1.8 File requested by user ‘a’ is successful 6. CONCLUSION The platform on which the services are to be shared and at last the market point of view that is its cost effectiveness compared to the available. The multi-cloud environment can end the vendor lock-in of the consumer which is attained in the single cloud. The major area of concern in this field is the agreement between the cloud service providers for collaboration of their services in multi- cloud. The consumer will get highly benefited with multi- cloud environment and obtain service based on his preferences and requirement and not based on his cloud service provider. A secure multicloud computing which provides collaboration between clouds and gives the user opportunity to download the files from different cloud that is present. This also provides the security to the user’s password and also to the files and data present in the cloud. 7. FUTURE ENHANCEMENT Cloud computing is new and growing very quickly, but because security issues are still delaying its adoption, we need to provide security mechanisms to ensure that cloud computing benefits are fully realized and utilized. Although there are many advantages to using a cloud- based system, practical problems remain that have to be solved before the technology can be more fully deployed, particularly those problems related to service level agreements, security, privacy, and power efficiency. 8. BIBLIOGRAPHY [1]. P. Mell and T. Grance, The NIST Definition of Cloud Computing,special publication 800-145, Nat’l Inst. Standards and Technology, 2011 [2]. D. Bernstein and D. Vij, “Intercloud Security Considerations,”Proc. 2nd Int’l Conf. Cloud Computing (CloudCom 10), IEEE Press, 2010, pp. 537-544. [3]. R. Buyya et al., “Market-Oriented Cloud Computing: Vision,Hype, and Reality of Delivering Computing as the 5th Utility,”Proc. 9th IEEE/ACM Int’l Symp. Cluster Computing and the Grid (CCGRID 09), IEEE CS, 2009, pp. 599-616. [4]. B. Rochwerger et al., “Reservoir—When One Cloud Is Not Enough,” Computer, Mar. 2011, pp. 44-51. [5]. M.P. Papazoglou and W. van den Heuvel, “Blueprinting the Cloud,” IEEE Internet Computing, Nov./Dec 2011, pp. 74-79. [6]. S. Ortiz Jr., “The Problem with Cloud Computing Standardization,”Computer, July 2011, pp. 13-16. [7]. P. Mell and T. Grance, “Perspectives on Cloud Computing and Standards, NIST Information Technology Laboratory,”Nat’l Inst. Standards and Technology, 2008; http://csrc.nist.gov/groups/SMA/ispab/documents/m inutes/2008-12/cloudcomputing-standards_ISPAB- Dec2008_P-Mell.pdf. [8]. W. Jansen and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, special publication 800-144,Nat’l Inst. Standards and Technology, 2011, p. x + 70. [9]. S. Chandrasekhar et al., “Efficient Proxy Signatures Based on Trapdoor Hash Functions,” IET Information Security,Dec. 2010, pp. 322-332. [10]. C.M. Ellison et al., SPKI Certificate Theory, IETF RFC 2693,Sept. 1999; www.ietf.org/rfc/rfc2693.txt. [11]. E. Hammer-Lahav, ed., The OAuth 1.0 Protocol, IETF RFC 5849, Apr. 2010; http://tools.ietf.org/html/rfc5849. [12]. Y. Zhang and J.B.D. Joshi, “Access Control and Trust Management for Emerging Multidomain Environments,” An .Emerging Research in Information Assurance, Security and Privacy Services, Emerald Group Publishing, 2009, pp.421- 452. [13]. J. Jin et al., “Patient-Centric Authorization Framework for Electronic Healthcare Services,” Computers & Security,Mar.-May 2011, pp. 116- 127. [14]. R. Wu, G.J. Ahn, and H. Hu, “Towards HIPAA- Compliant Healthcare Systems,” Proc. 2nd ACM Int’l Symp. Health Informatics (IHI 12), ACM, 2012, pp. 593-602. [15]. N.R. Adam and J.C. Wortmann, “Security-Control Methods for Statistical Databases: A Comparative Study,” ACM ComputingSurveys, Mar. 1989, pp. 515-556. [16]. L. Xiong, S. Chitti, and L. Liu, “Preserving Data Privacy in Outsourcing Data Aggregation Services,” ACM Trans. Internet Technology, Aug. 2007, p. 17. [17]. D.J. Abadi, S. Madden, and M. Ferreira, “Integrating Compression and Execution in Column-Oriented Database Systems,” Proc. ACM SIGMOD Int’l Conf. Management ofData (SIGMOD 06), ACM, 2006, pp. 671-682.