Achieving Data Security Using Inter Clouds

Abstract

Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information. This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. It is found that the research into the use of multi-cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.

Authors and Affiliations

A Siva Sravanthi, CH. TG Ramya

Keywords

Related Articles

Performance Comparison of Multi-resolution Wavelet Transforms to Hybrid Transforms for Image Compression

This paper proposes multi-resolution based image compression method. Wavelets have ability to analyze the signal at different resolutions to give different levels of details in the image. This property has been used i...

Resource Provisioning Techniques in Cloud Computing Environment: A Survey

Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned a...

Admittance Loading Of Dielectric Loaded Inclined Slots In The Narrow Wall Of A H-Plane Tee Junction

Slotted waveguide antennas find applications in microwave communication and radar systems requiring narrow beam or shaped beam patterns because of its compactness. They are particularly useful in airborne, space craft...

Improved Diversity with Limited Feed back for more than two users

We consider interference cancellation for a system with more than two users when users know each other channels. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or...

Fast Retrieval Of Unstructured Documents By Using Meta Data And Hierarchical Clustering

Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to informa...

Download PDF file
  • EP ID EP27671
  • DOI -
  • Views 283
  • Downloads 4

How To Cite

A Siva Sravanthi, CH. TG Ramya (2013). Achieving Data Security Using Inter Clouds. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27671