Single to Mlticloud Security By Parts

Authors

  • Harshal S. Wankar  Anjuman College Of Engineering And Technology, Department of Computer Science and Engineering, Sadar Nagpur , Maharashtra, India
  • Gaurav Jasutkar  Anjuman College Of Engineering And Technology, Department of Computer Science and Engineering, Sadar Nagpur , Maharashtra, India
  • Arati Chipate  Anjuman College Of Engineering And Technology, Department of Computer Science and Engineering, Sadar Nagpur , Maharashtra, India

Keywords:

Abstract

Cloud computing is largely viewing technology in software industries. It is adopted as service program, where users can remotely depot their data into the cloud so as to take advantage of on-demand high quality services from a shared set of manageable computer devices. Cloud computing offers large benefits to its users, But it also remain with a set of problems and unpredicted decision which security is the biggest concern. Now days cloud computing is very beneficial to its user for shearing a data with other without threating by unwanted user access. To access the security level on cloud storing data partition of data is done. The partition of data is not the final storage in cloud it just a middle step of process. The parts of data is get encrypted with secret shearing schema are used to restrict the unwanted access to the restricted data. The secret shearing schema is also get upgraded by adding Shamir’s secret shearing concept in it. Threshold secret sharing schema in which all the participants are needed in reconstruction phase this is required for reconstruct the secret. With these in feature easy data outsourcing with the help third party storage service providers. It has a considerable potential as similar process for traditional silo computing. The Shamir’s secret shearing schema is help to store the parted data in the different cloud with proper rearrangement method with it. The threated data from one cloud get corrupted or loss but the original data can be recover with other clouds data. Data encryption, threshold secret shearing schema, Shamir’s secret shearing algorithm is the mainly used for the securing data outsourcing. In this paper Shamir’s secret shearing schema with the utilization of partition of data is used in multi cloud environment.

References

Downloads

Published

2018-01-30

Issue

Section

Research Articles

How to Cite

[1]
Harshal S. Wankar, Gaurav Jasutkar, Arati Chipate "Single to Mlticloud Security By Parts" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 4, Issue 3, pp.207-210, January-February-2018.