© 2013, IJARCSSE All Rights Reserved Page | 919
Volume 3, Issue 5, May 2013 ISSN: 2277 128X
International Journal of Advanced Research in
Computer Science and Software Engineering
Research Paper
Available online at: www.ijarcsse.com
Cloud Computing Security potential for migration from a
single cloud to a Multi-Cloud Environment
B.Srinivasulu
#1
, S.V.SRIDHAR
#2,
U.Narasimhulu
#3,
K.Ramakrishna
#4
Hyderabad(A.P),India
Abstract – this paper we propose and evaluate The use of cloud computing has increased rapidly in many organizations.
Cloud computing provides many benefits in terms of low cost and accessibility ofdata. Ensuring the security of cloud
computing is a major factor inthe cloud computing environment, asusers often store sensitive information with
cloudstorage providers but these providers may beun trusted. Dealing with “single cloud” providers ispredicted to become
less popular with customers dueto risks of service availability failure and thepossibility of malicious insiders in the single
cloud. Amovement towards “multi-clouds”, or in other words,“Inter clouds” or “cloud-of-clouds” has
emergedrecently.This mainly focuses on the issues related to the data security aspect of cloud computing. As data and
information will be shared with a third party, cloud computing users want to avoid a untrusted cloudprovider. Protecting
private and important information, such as credit card details or a patient’s medical records from attackers or malicious
insiders is of critical importance. In addition, the potential for migration from a single cloud to a multi-cloud environment
is examined and research related to security issues in single and multi-clouds in cloud
Computingis surveyed.
Keywords:, Secret Shring Algoritham, Byzantine Protocol, Byzantinefault tolerance, Integrity Layer.
I. Introduction
The use of cloud computing has increased rapidly in many organizations Cloud providers should address privacy and security
issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers
due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single
cloud. In recent years, there has been a move towards “multi clouds”, “inter cloud” or “cloud -of-clouds”.
This paper focuses on the issues related to the data security aspect of cloud computing. As data and information will be
shared with a third party, cloud computing users want to avoid a un trusted cloud provider. Protecting private and important
information, such as credit card details or a patient‟s medicalrecords from attackers or malicious insiders is of critical
importance. In addition, the potential for migration from a single cloud to a multi-cloud environment is examined and
research related to security issues in single and multi-clouds in cloud computing is surveyed.
Cloud service providers should ensure the security of their customers‟ data and should be responsible if any
security risk affects their customers‟ serviceInfrastructure. A cloud provider offers many services that can benefit its
customers such as fast access to their data from any location, scalability, pay-for-use, data storage, and data recovery,
protection against hackers, on-demand security controls, and use of the network and infrastructure facilities
In this we are using “Secret Shring Algoritham “it is used how to store the data in different clouds. It is one type of
crypto graphic algorithm and it is used in security purpose.
In this we are using “byzantine fault tolerance protocol” it is used check the traffic in to the clouds. In this using one
formula‟ 3*f+1‟in this „f‟ means fault probability.
Background:
Cloud computing as “a model for enabling convenient, on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released
with minimal management effort or service provider interaction”. The cloud
Secret sharing algorithm:
Data stored in the cloud can be compromised or lost. So, we have to come up with a way to secure those files. We can
encrypt them before storing them in the cloud, which sorts out the disclosure aspects. However, what if the data is lost due to
some catastrophe befalling the cloud service provider? We could store it on more than one cloud service and encrypt it before
we send it off. Each of them will have the same file. What if we use an insecure, easily guessable password to protect the file,
or the same one to protect all files? I have often thought that secret sharing algorithms could be employed to good effect in
these circumstances instead.
They are algorithms that will share a secret between several parties, such that none of them can know the secret without the