Multi Cloud Architecture to Provide Data Privacy and Integrity.

Main Article Content

N. Meghasree
Dr.S.Prem Kumar


In recent years use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers are increased in industries and other organization as per requirements. While considering the power, stability and the security of cloud one can’t ignore different threats to user’s data on cloud storage. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted cloud server. Malicious user at cloud storage is become most difficult attacks to stop. In proposed system we are implementing the concept of multiple cloud storage along with enhanced security using encryption techniques where rather storing complete file on single cloud system will split the file in different chunks then encrypt and store it on different cloud and the meta data required for decrypting and rearranging a file will be stored in metadata management server.

Article Details

How to Cite
N. Meghasree, U.Veeresh, and Dr.S.Prem Kumar, “Multi Cloud Architecture to Provide Data Privacy and Integrity”., Int. J. Comput. Eng. Res. Trends, vol. 2, no. 9, pp. 558–564, Sep. 2015.
Research Articles


S. Subashini, V.Kavitha, “A Surveys on Security and privacy Issues in Service Delivery Models of the Cloud Computing”, Journal of Networks and Computer Applications, 34 (1), 2011, pp1-11.

Dawson, E.; Donovan, D. (1994), “The breadth of Shamir’s secretsharing scheme", Computers & Security 13: 69–78

Cloud Computing Security: From Singleto MultiClouds, 2012, 45th Hawaii International Conference on System Sciences.

Md. TanzimKhorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi, “A surveys on gaps, threat remediation challenge, and some thoughts for proactive attack detection in the cloud computing”, School of Information and Communication Technology, CQ University QLD 4702, Australia. Received 15 August 2011. Revised 11 January 2012. Accepted 18 January 2012. Available online 27 January 2012.

C. Cachin, I. Keidarand A. Shraer, “Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.

A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, “DepSky: dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46.

Review of methods for secret sharing in cloud Computing- “International Journal of Advanced Research in Computer Engineering & Technology IJARCET)”, Volume 2, Issue 1, and January 2013.

Most read articles by the same author(s)

1 2 3 > >>