SlideShare ist ein Scribd-Unternehmen logo
1 von 8
ABSTRACT:
The use of cloud computing has increased rapidly in many organizations. Cloud
computing provides many benefits in terms of low cost and accessibility of data.
Ensuring the security of cloud computing is a major factor in the cloud computing
environment, as users often store sensitive information with cloud storage providers
but these providers may be untrusted. Dealing with “single cloud” providers is
predicted to become less popular with customers due to risks of service availability
failure and the possibility of malicious insiders in the single cloud. A movement
towards “multi-clouds”, or in other words, “inter-clouds” or “cloud-of-clouds” has
emerged recently. This paper surveys recent research related to single and multi-
cloud security and addresses possible solutions. It is found that the research into the
use of multi-cloud providers to maintain security has received less attention from
the research community than has the use of single clouds. This work aims to
promote the use of multi-clouds due to its ability to reduce security risks that affect
the cloud computing user.
Depsky architecture to implement the multi-cloud system helps to provide
“Confidentiality” as well as “Integrity” along with protection to phishing attacks.
We propose VCS based scheme to protect the multi-cloud system from phishing
attack. In this scheme user can easily detect the phishing sites.
1. INTRODUCTION:
1.1 BACKGROUND:
NIST [1] describes cloud computing as “a model for enabling convenient, on-
demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal management effort or
service provider interaction”.
In literature of security, to protect from phishing attacks attribute based
schemes are used. But false positive rate of these methods is higher, so we
propose new VCS based anti-phishing framework.
1 Email Us : info@ocularsystems.in
Mobile : 7385350430
1.2 AIM AND OBJECTIVE:
The use of cloud computing has increased rapidly in many organizations. Cloud
computing provides many benefits in terms of low cost and accessibility of data.
Ensuring the security of cloud computing is a major factor in the cloud computing
environment, as users often store sensitive information with cloud storage providers
but these providers may be untrusted. Dealing with “single cloud” providers is
predicted to become less popular with customers due to risks of service availability
failure and the possibility of malicious insiders in the single cloud. A movement
towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has
emerged recently. This paper surveys recent research related to single and multi-
cloud and addresses possible solutions. It is found that the research into the use of
multi-cloud providers to maintain security has received less attention from the
research community than has the use of single clouds. This work aims to promote
the use of multi-clouds due to its ability to reduce security risks that affect the cloud
computing user.
While making a cloud secure, the following objectives are to be met:
1) Understanding the cloud computing environment provided by the cloud service
provider.
2) The cloud computing solution should meet the basic security and privacy
requirements of any firm deploying it.
3) Maintain an account of the privacy of the cloud and data security and applications
that are deployed in cloud computing environment.
4) Data Integrity.
5) Service Availability.
6) The user runs customer applications using the service provider’s resources
1.2 PROPOSED WORK:
This paper focuses on the issues related to the data security aspect of cloud
computing. As data and information will be shared with a third party, cloud
computing users want to avoid an untrusted cloud provider. Protecting private and
important information, such as credit card details or a patient’s medical records
from attackers or malicious insiders is of critical importance. In addition, the
potential for migration from a single cloud to a multi-cloud environment is
2 Email Us : info@ocularsystems.in
Mobile : 7385350430
examined and research related to security issues in single and multi-clouds in cloud
Computing are surveyed.
2. PROPOSED SYSTEM:
3.1PROPOSED APPROACH:
In this system we are uploading the file onto the different public cloud
which maintains the integrity confidentiality and security of uploaded
files on cloud. We use MD5 algorithm for computing the hash value
(digital signature) of files before upload. After that we apply our main
algorithm which divides files into different shares and each share
contains unreadable text format and that will be uploaded to each cloud.
At download time we can choose any of the 3 clouds and that file will be
reconstructed.
3.2PROPOSED ARCHITECTURE:
3.2.1 User Registration Process:
3.2.2 User Login Process:
3 Email Us : info@ocularsystems.in
Mobile : 7385350430
3.2.3 Multicloud Architecture for Data Security:
4 Email Us : info@ocularsystems.in
Mobile : 7385350430
5 Email Us : info@ocularsystems.in
Mobile : 7385350430
4 Tools/ Software Required:
4.1 Microsoft Visual Studio 2010
4.2 Microsoft SQL Server 2008
4.3 Windows Azure & Other Cloud FTP Accounts
4.4 File Zilla ftp client to view files on cloud spaces.
5 Algorithms Used:
5.1Visual Cryptography Scheme
5.1.1 Share Creation Algorithm
5.1.2 Share Re-Construction Algorithm
5.2 Dynamic Captcha Creation
5.3 MD5
5.4 Shamir’s Secrete Sharing:
5.4.1 Creating Shares
5.4.2 Re-Construction
6 Modules of Project:
6.1 User Registration:
6.1.1 VCS Share Generation
6.1.2 Share Download to User
6.1.3 Saving user login credentials to server
6.2 User Login:
6.2.1 VCS Share Re-Construction
6.2.2 Authenticate User
6 Email Us : info@ocularsystems.in
Mobile : 7385350430
6.3 File Upload Module:
6.3.1 Create shares using Shamir’s Secrete Sharing
6.3.2 Calculate MD5 signature for original file
6.3.3 Store log for file-upload
6.3.4 Upload all shares
6.4 File Download:
6.4.1 Shares re-construction
6.4.2 Check for integrity of file
6.4.3 Download if correctly matching MD5 signatures otherwise
warn user regarding malicious content.
6.5 User log:
6.5.1 View User Upload & Download Logs
6.6 Cloud Configuration Module:
6.6.1 Configure login credentials for cloud FTP api for file transfer
on cloud servers.
7 REFERENCES:
[1] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal
resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp.
387-408.
[2] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud
storage diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010,
pp. 229-240.
[3] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as
a Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data
Engineering, 2009, pp. 1709-1716.
[4] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-
as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.
7 Email Us : info@ocularsystems.in
Mobile : 7385350430
[5] Amazon, Amazon Web Services. Web services licensing agreement,
October3,2006.
[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song,
"Provable possession at untrusted stores", Proc. 14th ACM Conf. on Computer and
communications security, 2007, pp. 598-609.
[7] A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky:
dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. on
Computer systems, 2011, pp. 31-46.
[8] K. Birman, G. Chockler and R. van Renesse,"Toward a cloud computing research
agenda", SIGACT News, 40, 2009, pp. 68-80.
[9] K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer
for cloud storage", CCS'09: Proc. 16th ACM Conf. onComputer and communications
security, 2009, pp.187-198.
[10] C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud",
Research Report RZ,
3783, 2010.
[11] C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40,
2009, pp. 81-86.
[12] C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded Byzantine
distributed storage", DISC:Proc. 19thIntl.Conf. on Distributed Computing, 2005, pp.
497-498.
[13] M. Castro and B. Liskov, "Practical Byzantine fault tolerance", Operating
Systems Review, 33, 1998, pp. 173-186.
8 Email Us : info@ocularsystems.in
Mobile : 7385350430

Weitere ähnliche Inhalte

Mehr von SWAMI06

Multimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question AnsweringMultimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question Answering
SWAMI06
 

Mehr von SWAMI06 (10)

ns2-project-list
ns2-project-listns2-project-list
ns2-project-list
 
Heart disease prediction system
Heart disease prediction systemHeart disease prediction system
Heart disease prediction system
 
Detection of Spyware by Mining Executable Files
Detection of  Spyware by Mining Executable FilesDetection of  Spyware by Mining Executable Files
Detection of Spyware by Mining Executable Files
 
Annotating Search Results from Web Databases
Annotating Search Results from Web DatabasesAnnotating Search Results from Web Databases
Annotating Search Results from Web Databases
 
Multimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question AnsweringMultimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question Answering
 
Keyword Query Routing
Keyword Query RoutingKeyword Query Routing
Keyword Query Routing
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Efficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity RankingEfficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity Ranking
 
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language ProcessingOpinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
 
Frequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoopFrequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoop
 

Kürzlich hochgeladen

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Kürzlich hochgeladen (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 

Single to Multicloud Using Vcs Technology

  • 1. ABSTRACT: The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in other words, “inter-clouds” or “cloud-of-clouds” has emerged recently. This paper surveys recent research related to single and multi- cloud security and addresses possible solutions. It is found that the research into the use of multi-cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. Depsky architecture to implement the multi-cloud system helps to provide “Confidentiality” as well as “Integrity” along with protection to phishing attacks. We propose VCS based scheme to protect the multi-cloud system from phishing attack. In this scheme user can easily detect the phishing sites. 1. INTRODUCTION: 1.1 BACKGROUND: NIST [1] describes cloud computing as “a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. In literature of security, to protect from phishing attacks attribute based schemes are used. But false positive rate of these methods is higher, so we propose new VCS based anti-phishing framework. 1 Email Us : info@ocularsystems.in Mobile : 7385350430
  • 2. 1.2 AIM AND OBJECTIVE: The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has emerged recently. This paper surveys recent research related to single and multi- cloud and addresses possible solutions. It is found that the research into the use of multi-cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. While making a cloud secure, the following objectives are to be met: 1) Understanding the cloud computing environment provided by the cloud service provider. 2) The cloud computing solution should meet the basic security and privacy requirements of any firm deploying it. 3) Maintain an account of the privacy of the cloud and data security and applications that are deployed in cloud computing environment. 4) Data Integrity. 5) Service Availability. 6) The user runs customer applications using the service provider’s resources 1.2 PROPOSED WORK: This paper focuses on the issues related to the data security aspect of cloud computing. As data and information will be shared with a third party, cloud computing users want to avoid an untrusted cloud provider. Protecting private and important information, such as credit card details or a patient’s medical records from attackers or malicious insiders is of critical importance. In addition, the potential for migration from a single cloud to a multi-cloud environment is 2 Email Us : info@ocularsystems.in Mobile : 7385350430
  • 3. examined and research related to security issues in single and multi-clouds in cloud Computing are surveyed. 2. PROPOSED SYSTEM: 3.1PROPOSED APPROACH: In this system we are uploading the file onto the different public cloud which maintains the integrity confidentiality and security of uploaded files on cloud. We use MD5 algorithm for computing the hash value (digital signature) of files before upload. After that we apply our main algorithm which divides files into different shares and each share contains unreadable text format and that will be uploaded to each cloud. At download time we can choose any of the 3 clouds and that file will be reconstructed. 3.2PROPOSED ARCHITECTURE: 3.2.1 User Registration Process: 3.2.2 User Login Process: 3 Email Us : info@ocularsystems.in Mobile : 7385350430
  • 4. 3.2.3 Multicloud Architecture for Data Security: 4 Email Us : info@ocularsystems.in Mobile : 7385350430
  • 5. 5 Email Us : info@ocularsystems.in Mobile : 7385350430
  • 6. 4 Tools/ Software Required: 4.1 Microsoft Visual Studio 2010 4.2 Microsoft SQL Server 2008 4.3 Windows Azure & Other Cloud FTP Accounts 4.4 File Zilla ftp client to view files on cloud spaces. 5 Algorithms Used: 5.1Visual Cryptography Scheme 5.1.1 Share Creation Algorithm 5.1.2 Share Re-Construction Algorithm 5.2 Dynamic Captcha Creation 5.3 MD5 5.4 Shamir’s Secrete Sharing: 5.4.1 Creating Shares 5.4.2 Re-Construction 6 Modules of Project: 6.1 User Registration: 6.1.1 VCS Share Generation 6.1.2 Share Download to User 6.1.3 Saving user login credentials to server 6.2 User Login: 6.2.1 VCS Share Re-Construction 6.2.2 Authenticate User 6 Email Us : info@ocularsystems.in Mobile : 7385350430
  • 7. 6.3 File Upload Module: 6.3.1 Create shares using Shamir’s Secrete Sharing 6.3.2 Calculate MD5 signature for original file 6.3.3 Store log for file-upload 6.3.4 Upload all shares 6.4 File Download: 6.4.1 Shares re-construction 6.4.2 Check for integrity of file 6.4.3 Download if correctly matching MD5 signatures otherwise warn user regarding malicious content. 6.5 User log: 6.5.1 View User Upload & Download Logs 6.6 Cloud Configuration Module: 6.6.1 Configure login credentials for cloud FTP api for file transfer on cloud servers. 7 REFERENCES: [1] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387-408. [2] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240. [3] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as a Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data Engineering, 2009, pp. 1709-1716. [4] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database- as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9. 7 Email Us : info@ocularsystems.in Mobile : 7385350430
  • 8. [5] Amazon, Amazon Web Services. Web services licensing agreement, October3,2006. [6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable possession at untrusted stores", Proc. 14th ACM Conf. on Computer and communications security, 2007, pp. 598-609. [7] A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. on Computer systems, 2011, pp. 31-46. [8] K. Birman, G. Chockler and R. van Renesse,"Toward a cloud computing research agenda", SIGACT News, 40, 2009, pp. 68-80. [9] K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. onComputer and communications security, 2009, pp.187-198. [10] C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud", Research Report RZ, 3783, 2010. [11] C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86. [12] C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded Byzantine distributed storage", DISC:Proc. 19thIntl.Conf. on Distributed Computing, 2005, pp. 497-498. [13] M. Castro and B. Liskov, "Practical Byzantine fault tolerance", Operating Systems Review, 33, 1998, pp. 173-186. 8 Email Us : info@ocularsystems.in Mobile : 7385350430