Multi Cloud Architecture to Provide Data Privacy and Integrity.
N. Meghasree, U.Veeresh, Dr.S.Prem Kumar, ,
Affiliations (M.Tech), CSEAssistant Professor, Department of Computer Science and EngineeringProfessor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
In recent years use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers
are increased in industries and other organization as per requirements. While considering the power, stability and the
security of cloud one can’t ignore different threats to user’s data on cloud storage. Data access control is an effective
way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data
access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer
applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require
a fully trusted cloud server. Malicious user at cloud storage is become most difficult attacks to stop. In proposed system
we are implementing the concept of multiple cloud storage along with enhanced security using encryption techniques
where rather storing complete file on single cloud system will split the file in different chunks then encrypt and store it on
different cloud and the meta data required for decrypting and rearranging a file will be stored in metadata management
N. Meghasree,U.Veeresh,Dr.S.Prem Kumar."Multi Cloud Architecture to Provide Data Privacy and Integrity.". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 09,pp.558-564, SEPTEMBER- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I907.pdf,
 S. Subashini, V.Kavitha, “A Surveys on Security and privacy Issues in Service Delivery Models of the Cloud Computing”, Journal of Networks and Computer Applications, 34 (1), 2011, pp1-11. .
 Dawson, E.; Donovan, D. (1994), “The breadth of Shamir’s secretsharing scheme", Computers & Security 13: 69–78
Cloud Computing Security: From Singleto MultiClouds, 2012, 45th Hawaii International Conference on System Sciences.
 Md. TanzimKhorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi, “A surveys on gaps, threat remediation challenge, and some thoughts for proactive attack detection in the cloud computing”, School of Information and Communication Technology, CQ University QLD 4702, Australia. Received 15 August 2011. Revised 11 January 2012. Accepted 18 January 2012. Available online 27 January 2012.
 C. Cachin, I. Keidarand A. Shraer, “Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
 A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, “DepSky: dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46.
 Review of methods for secret sharing in cloud Computing- “International Journal of Advanced Research in Computer Engineering & Technology IJARCET)”, Volume 2, Issue 1, and January 2013.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.