Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems

Authors

  • Pranav Ojha PG Student, Department of Computer Applications, Dr. M. G. R. Educational and Research Institute, Chennai - 95

DOI:

https://doi.org/10.53469/jrse.2024.06(08).12

Keywords:

Cloud computing, cloud of clouds, multi - clouds

Abstract

Cloud computing has increased rapidly in many organizations and then it's utilized. Cloud computing provides safe data. Cloud computing provides many advantages in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards "multi - clouds", or in other words, "inter clouds" or "cloud - of - clouds" has emerged recently. We propose the recent research related to single and multi - cloud security and address possible solutions. It is found that the research into the use of multi - cloud providers to maintain security has received less attention from the research community than the use of single clouds. This work aims to promote the use of multi - clouds due to their ability to reduce security risks that affect the cloud computing user. We proposed the AES algorithm can explore the cloud sharing to multiple clouds. This algorithm protects secure to personal information, financial records, and other confidential records. The system is highly effective in accuracy.

References

Enokido T, Aikebaier A, Takizawa M (2019) A model for reducing power consumption in peer - to - peer systems. IEEE Syst J 4 (2): 221–229

H. Tabrizchi and M. K. Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” J. Supercomput., vol.76, no.12, pp.9493–9532, 2020.

A. Rashid and A. Chaturvedi, “Virtualization and its role in cloud computing environment,” International Journal of Computer Sciences and Engineering, vol.7, no.4, pp.1131–1136, 2019

A. H. Shaikh and B. Meshram, “Security issues in cloud computing, ” in Intelligent Computing and Networking. Springer, 2020, pp.63–77.

Puneeth Kumar BS, Ramesh Naidu P, Sridhara SB (2023) Internet of Things and cognitive radio networks: applications, challenges and future. In: Yadav S, Chaudhary K, Gahlot A, Arya Y, Dahiya A, Garg N (eds) Recent advances in metrology. Lecture Notes in Electrical Engineering, vol 906. Springer, Singapore.

Cloud computing with security Naresh Kumar Sehgal, Pramod Chandra P Bhatt, John M Acken Concepts and practices. Second edition. Switzerland: Springer, 2020.

An integrated architecture for maintaining security in cloud computing based on blockchain Ruba Awadallah, Azman Samsudin, Je Sen Teh, Mishal Almazrooie IEEE Access 9, 69513 - 69526, 2021.

Cloud computing security: A survey of service - based models Fatemeh Khoda Parast, Chandni Sindhav, Seema Nikam, Hadiseh Izadi Yekta, Kenneth B Kent, Saqib Hakak Computers & Security 114, 102580, 2022.

Strengthening Cloud Security: An Innovative Multi - Factor Multi - Layer Authentication Framework for Cloud User Authentication Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K Elbashir, Meshrif Alruily, Eslam Hamouda, Mohamed Alsarhani, Wael SaidApplied Sciences 13 (19), 10871, 2023.

Elliptic Curve Cryptography Performance Evaluation for Securing Multi - Factor Systems in a Cloud Computing Environment GO Ogunleye, SE Akinsanya Iraqi Journal of Science, 3212 - 3224, 2022.

Xu, J., Jiang, Y., Yuan, B., Li, S., & Song, T. (2023, November). Automated Scoring of Clinical Patient Notes using Advanced NLP and Pseudo Labeling. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 384-388). IEEE.

Ji, H., Xu, X., Su, G., Wang, J., & Wang, Y. (2024). Utilizing Machine Learning for Precise Audience Targeting in Data Science and Targeted Advertising. Academic Journal of Science and Technology, 9(2), 215-220.

Yao, J., & Yuan, B. (2024). Optimization Strategies for Deep Learning Models in Natural Language Processing. Journal of Theory and Practice of Engineering Science, 4(05), 80-87.

Yuan, B. (2024). Design of an Intelligent Dialogue System Based on Natural Language Processing. Journal of Theory and Practice of Engineering Science, 4(01), 72-78.

Yuan, B., & Song, T. (2023, November). Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination. In Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering (pp. 853-856).

Xu, X., Yuan, B., Song, T., & Li, S. (2023, November). Curriculum recommendations using transformer base model with infonce loss and language switching method. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 389-393). IEEE.

Yuan, B. (2024). Design of an Intelligent Dialogue System Based on Natural Language Processing. Journal of Theory and Practice of Engineering Science, 4(01), 72-78.

Xu, J., Jiang, Y., Yuan, B., Li, S., & Song, T. (2023, November). Automated Scoring of Clinical Patient Notes using Advanced NLP and Pseudo Labeling. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 384-388). IEEE.

Jiang, L., Yu, C., Wu, Z., & Wang, Y. (2024). Advanced AI framework for enhanced detection and assessment of abdominal trauma: Integrating 3D segmentation with 2D CNN and RNN models. arXiv preprint arXiv:2407.16165.

Yao, J., & Yuan, B. (2024). Research on the Application and Optimization Strategies of Deep Learning in Large Language Models. Journal of Theory and Practice of Engineering Science, 4(05), 88-94.

Xu, X., Yuan, B., Song, T., & Li, S. (2023, November). Curriculum recommendations using transformer base model with infonce loss and language switching method. In 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA) (pp. 389-393). IEEE.

Ren, Z. (2024). Enhanced YOLOv8 Infrared Image Object Detection Method with SPD Module. Journal of Theory and Practice in Engineering and Technology, 1(2), 1–7. Retrieved from https://woodyinternational.com/index.php/jtpet/article/view/42

Yuan, B., & Song, T. (2023, November). Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination. In Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering (pp. 853-856).

Yuan, B., Song, T., & Yao, J. (2024, January). Identification of important nodes in the information propagation network based on the artificial intelligence method. In 2024 4th International Conference on Consumer Electronics and Computer Engineering (ICCECE) (pp. 11-14). IEEE.

Ren, Z. (2024). VGCN: An Enhanced Graph Convolutional Network Model for Text Classification. Journal of Industrial Engineering and Applied Science, 2(4), 110-115.

Xu, Y., Lin, Y.-S., Zhou, X., & Shan, X. (2024). Utilizing emotion recognition technology to enhance user experience in real-time. Computing and Artificial Intelligence, 2(1), 1388. https://doi.org/10.59400/cai.v2i1.1388

Downloads

Published

2024-08-29

How to Cite

Ojha, P. (2024). Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems. Journal of Research in Science and Engineering, 6(8), 52–56. https://doi.org/10.53469/jrse.2024.06(08).12