Survey of Cloud Security Techniques

Abstract

Cloud storage is use to reduce the cost of storage in I.T fields and other benefits such as data accessibility through internet. Ensuring the security of cloud server is important so store sensitive data for example confidential data. In single cloud there is risk of data availability and security. If cloud server is attack but malicious content then there might be loss of data and its availability. So multiple cloud or cloud-of-clouds emerged to secure the data and increase its availability using Shamir’s secret sharing algorithm. We reviewed many paper and research related on single and multi clouds security using Shamir’s secret sharing key algorithm. The main motto of our project and paper is multi clouds, data security and reduce attackers and successful implementation of Shamir’s secret sharing algorithm. It is a form of secret sharing, where a secret is divided into parts, which is giving each participant its own unique part, where some of the parts or all of them are required in order to reconstruct the secret key [1]-[3].

Authors and Affiliations

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane

Keywords

Related Articles

A Hybrid Data Hiding Approach for Securing Online Transactions

Online Banking is an arrangement of administrations given by a gathering of organized bank offices. Bank clients may get to their assets and perform other basic exchanges from any of the part branch workplaces. The real...

slugEXPERIMENTAL ANALYSIS OF AN EXPLOSIVE TEST CHAMBER SUBJECTED TO INTERNAL BLAST LOADING

Explosive test chambers are huge closed chambers used in research, testing of explosive materials and armor, research, and testing of nature of explosives used in military and defense weapons. The chamber is a huge, cyl...

Secure Electronic Voting Machine with Finger Print Based Biometric System

Electronic voting mean for (e-voting) and it casting votes and counting votes electronically. This technology used for punch cards, optical scan voting systems, Direct-recording electronic (DRE) voting systems and priva...

Inlet Shroud Angle of a Shrouded Wind Turbine

In order to utilize the wind power more economically, it was suggested that a specially designed shroud could be used to enclose the wind turbine so that its performance could be increased. Various geometries are discus...

Suggestion of Traffic System for Various Places in Miraj City on The Basis of SATIS Project (Thane)

This project relates with the decongestion of the traffic in the three main areas of Miraj city, namely City Stand, Heera Chowk and Gandhi Chowk. Out of these two areas of highest traffic density, for the area of City...

Download PDF file
  • EP ID EP19682
  • DOI -
  • Views 278
  • Downloads 5

How To Cite

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane (2015). Survey of Cloud Security Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(3), -. https://europub.co.uk/articles/-A-19682