Survey of Cloud Security Techniques

Abstract

Cloud storage is use to reduce the cost of storage in I.T fields and other benefits such as data accessibility through internet. Ensuring the security of cloud server is important so store sensitive data for example confidential data. In single cloud there is risk of data availability and security. If cloud server is attack but malicious content then there might be loss of data and its availability. So multiple cloud or cloud-of-clouds emerged to secure the data and increase its availability using Shamir’s secret sharing algorithm. We reviewed many paper and research related on single and multi clouds security using Shamir’s secret sharing key algorithm. The main motto of our project and paper is multi clouds, data security and reduce attackers and successful implementation of Shamir’s secret sharing algorithm. It is a form of secret sharing, where a secret is divided into parts, which is giving each participant its own unique part, where some of the parts or all of them are required in order to reconstruct the secret key [1]-[3].

Authors and Affiliations

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane

Keywords

Related Articles

Vibration Control of Unsymmetrical RC Building Using Tuned Mass Damper

Vibrations are one of many environmental factors that act on building and potentially reduce their lifetime. Current trends in construction demand taller and lighter structures, which are also flexible and having quite...

slugMaximizing Network Lifetime of Wireless Sensor Network-A Review

Wireless sensor networks are becoming increasingly important in recent years due to their ability to detect and convey realtime information for many civilian and military applications. Wireless sensor network deployed th...

Elephant Habitat Suitability using Geoinformatics for Palamau Tiger Reserve, Jharkhand (India)

Geoinformatics plays an important role to understand human wildlife conflicts and the conservation of various natural resources. There have been increase in the incidents of human animal conflicts due to human encroachm...

Performance of Building for Different Orientation of Shear Wall

In this study we have considered shear wall system for the stability of structure against lateral forces. Shear wall is a vertical member which can resist moment, shear and axial load arising due to gravity and lateral...

Value Engineering In Construction Industry

The Value Engineering is an intensive, interdisciplinary problem solving activity that focuses on improving the value of the functions that are required to accomplish the goal, or objective of any product, process, serv...

Download PDF file
  • EP ID EP19682
  • DOI -
  • Views 254
  • Downloads 5

How To Cite

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane (2015). Survey of Cloud Security Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(3), -. https://europub.co.uk/articles/-A-19682