Survey of Cloud Security Techniques

Abstract

Cloud storage is use to reduce the cost of storage in I.T fields and other benefits such as data accessibility through internet. Ensuring the security of cloud server is important so store sensitive data for example confidential data. In single cloud there is risk of data availability and security. If cloud server is attack but malicious content then there might be loss of data and its availability. So multiple cloud or cloud-of-clouds emerged to secure the data and increase its availability using Shamir’s secret sharing algorithm. We reviewed many paper and research related on single and multi clouds security using Shamir’s secret sharing key algorithm. The main motto of our project and paper is multi clouds, data security and reduce attackers and successful implementation of Shamir’s secret sharing algorithm. It is a form of secret sharing, where a secret is divided into parts, which is giving each participant its own unique part, where some of the parts or all of them are required in order to reconstruct the secret key [1]-[3].

Authors and Affiliations

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane

Keywords

Related Articles

A Review Paper on the Fatigue of Steel Bridges

Steel bridges plays an important role in the transportation industry, they are preferred for their ease in construction, maintenance and strengthening capabilities. Steel bridges are serving transportation industry sinc...

slugQoS and Scalability with Mobility on the Performance of Routing Protocols of MANETs Using OPNET Modeller

MANET is combination of mobile nodes which uses multi hop transmission for communication. Due to highly dynamic topology, routing in MANET is challenging task, moreover presence of malicious nodes make t...

Genetic Algorithm Based Optimization of Design Variable for Minimization of Non-Dimensionalized Maximum Deflection of a Laminated Composite Plate

This research paper deals with the static analysis of a thin rectangular laminated composite plate. The main objective of the proposed work is to minimize the non-dimensionalized maximum deflection of the laminated comp...

slugPower Efficient Fir Filter Design

Finite Impulse Response (FIR) digital filter is basic component in communication systems and in many digital signal processing (DSP). FIR filter is broadly used in portable application with small area and low power. In...

Design of 12-Bit DAC Using CMOS Technology

Digital-to-Analog Converter (DAC) is used to convert a digital form of input into an analog form of output. In this paper, a digital-to-analog converter which is based on the R-2R ladder is analyzed for low power consum...

Download PDF file
  • EP ID EP19682
  • DOI -
  • Views 273
  • Downloads 5

How To Cite

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane (2015). Survey of Cloud Security Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(3), -. https://europub.co.uk./articles/-A-19682