Survey of Cloud Security Techniques

Abstract

Cloud storage is use to reduce the cost of storage in I.T fields and other benefits such as data accessibility through internet. Ensuring the security of cloud server is important so store sensitive data for example confidential data. In single cloud there is risk of data availability and security. If cloud server is attack but malicious content then there might be loss of data and its availability. So multiple cloud or cloud-of-clouds emerged to secure the data and increase its availability using Shamir’s secret sharing algorithm. We reviewed many paper and research related on single and multi clouds security using Shamir’s secret sharing key algorithm. The main motto of our project and paper is multi clouds, data security and reduce attackers and successful implementation of Shamir’s secret sharing algorithm. It is a form of secret sharing, where a secret is divided into parts, which is giving each participant its own unique part, where some of the parts or all of them are required in order to reconstruct the secret key [1]-[3].

Authors and Affiliations

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane

Keywords

Related Articles

slugPerformance optimized of MIMO transmission link

Wireless communication using Multiple-Input Multiple-Output (MIMO) links has emerged as one of the most significant breakthroughs in modern communications because of the huge capacity and reliability gains promised even...

The Survey on Energy Efficient Routing Protocols

In this paper we propose an approach. The wireless sensor network consists of the nodes, base station and these networks are low cost, has limited battery, which is rechargeable, other than battery, gateways can be used...

MATLAB Techniques for Enhancement of Liver DICOM Images

DICOM has become a standard for medical imaging. Its purpose is to standardize digital medical imaging and data for easy access and sharing. There are many commercial viewers that support DICOM image format and can read...

Induction Motor Efficiency Monitoring using CAN Protocol

In many manufacturing based industries, motors will always be one of the main components. Starting from one or two motors, it goes up to hundred thousands of them. When there are a lot of motors in a single company, it...

Object Detection And Tracking Using Instant Online Feature Extraction

It is not always possible to provide labeled data for training because it requires substantial human effort, expensive tests, disagreement among experts. Labeling is not possible at instance level.To overcome these prob...

Download PDF file
  • EP ID EP19682
  • DOI -
  • Views 274
  • Downloads 5

How To Cite

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane (2015). Survey of Cloud Security Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(3), -. https://europub.co.uk/articles/-A-19682