Survey of Cloud Security Techniques

Abstract

Cloud storage is use to reduce the cost of storage in I.T fields and other benefits such as data accessibility through internet. Ensuring the security of cloud server is important so store sensitive data for example confidential data. In single cloud there is risk of data availability and security. If cloud server is attack but malicious content then there might be loss of data and its availability. So multiple cloud or cloud-of-clouds emerged to secure the data and increase its availability using Shamir’s secret sharing algorithm. We reviewed many paper and research related on single and multi clouds security using Shamir’s secret sharing key algorithm. The main motto of our project and paper is multi clouds, data security and reduce attackers and successful implementation of Shamir’s secret sharing algorithm. It is a form of secret sharing, where a secret is divided into parts, which is giving each participant its own unique part, where some of the parts or all of them are required in order to reconstruct the secret key [1]-[3].

Authors and Affiliations

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane

Keywords

Related Articles

slugA Survey– Algorithm For Fault Node Recovery For Wireless Sensor Network

Fault node recovery algorithm is used to increase the life time of wireless sensors network when some node stop working or found to be faulted .This algorithm is a combination of grad...

Personalized Retrieval in E – Health Using Cloud

Electronic patient health records encompass valuable information about patient’s medical problems, diagnoses, and treatments offered including their outcomes. However, a problem for medical professionals is an ability t...

Size Effects on Flexural Behavior of Steel Fiber Reinforced Concrete with Industrial Wastes

Presently in India, about 960 million tonnes of solid waste is being generated annually as by-products during industrial, mining, municipal, agricultural and otherprocesses.Due to the rapid industrialization taking plac...

Structural Analysis of Bicycle Structure and Improvement Analysis using Analytical and Finite Element Analysis

Bicycles are the common man mode of transportation for centuries. They are environmentally friendly and remote places can be easily accessed where road conditions are bad. Since it is essential member of common people,...

slugEconomic load dispatch problem using Heuristic gravitational search algorithm

This paper describes gravitational search algorithm for solving the non convex Economic load Dispatch (ELD) problem. The main objective of economic load dispatch problem is to generate the required amount of power so th...

Download PDF file
  • EP ID EP19682
  • DOI -
  • Views 270
  • Downloads 5

How To Cite

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane (2015). Survey of Cloud Security Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(3), -. https://europub.co.uk/articles/-A-19682