Survey of Cloud Security Techniques

Abstract

Cloud storage is use to reduce the cost of storage in I.T fields and other benefits such as data accessibility through internet. Ensuring the security of cloud server is important so store sensitive data for example confidential data. In single cloud there is risk of data availability and security. If cloud server is attack but malicious content then there might be loss of data and its availability. So multiple cloud or cloud-of-clouds emerged to secure the data and increase its availability using Shamir’s secret sharing algorithm. We reviewed many paper and research related on single and multi clouds security using Shamir’s secret sharing key algorithm. The main motto of our project and paper is multi clouds, data security and reduce attackers and successful implementation of Shamir’s secret sharing algorithm. It is a form of secret sharing, where a secret is divided into parts, which is giving each participant its own unique part, where some of the parts or all of them are required in order to reconstruct the secret key [1]-[3].

Authors and Affiliations

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane

Keywords

Related Articles

Sharpness-Based Segmentation of Defocus Blur

The defocus blur is occur when using optical imaging systems, it can either enhance or inhibit our visual perception of the image scene. For tasks such as image restoration and object recognition one might want to segme...

Structural, morphological and optical properties of CdS thin film prepared by perfume atomizer

Nanocrystalline cadmium sulfide (CdS) thin film was deposited on glass substrate by relatively simple, quick and cost effective perfume spray atomizer method at the temperature 3500C. A further study has been made for s...

The Art of Business Relationships Through Social Media

Academic researchers have studied this issue using concepts and techniques such as social capital and social networks analysis. They have provided empirical as well as theoretical evidence of the value generated by diff...

slugUniversal Query for Travel Information in Intelligent Transportation System

Intelligent Transportation System (ITS) applies on advanced technologies of electronics, communications, computers, control and sensing and detecting in all kinds of transportation system in order to improve safety, eff...

Experimental Investigation of Thermal properties of sisal fiber reinforced composite and effect of SiC filler material

With a view of exploring the potential use of natural recourses, we made an attempt to fabricate sisal fiber polymer composites by hand lay-up method. Natural fiber composites are re newa bl e , c h e a p and biodegrada...

Download PDF file
  • EP ID EP19682
  • DOI -
  • Views 258
  • Downloads 5

How To Cite

Chirag Padsala, Rohit Palav, Paras Shah, Sachin Sonawane (2015). Survey of Cloud Security Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(3), -. https://europub.co.uk./articles/-A-19682