A Novel Approach for Framework and Security Issues Cooperation in Multicloud Computing Environment
|International Journal of Computer Science and Engineering|
|© 2014 by SSRG - IJCSE Journal|
|Volume 1 Issue 7|
|Year of Publication : 2014|
|Authors : Kediga pallavi, Narsimha Banothu, Janapati Venkata Krishna|
How to Cite?
Kediga pallavi, Narsimha Banothu, Janapati Venkata Krishna, "A Novel Approach for Framework and Security Issues Cooperation in Multicloud Computing Environment," SSRG International Journal of Computer Science and Engineering , vol. 1, no. 7, pp. 9-12, 2014. Crossref, https://doi.org/10.14445/23488387/IJCSE-V1I7P102
A proposed proxy-based multi-cloud computing structure allows dynamic, on the fly collaborations and resource split among cloud-based services, addressing trust, policy, and privacy concern without pre-established collaboration agreements or standardized computing. The recent surge in cloud computing arises from its capability to provide software, infrastructure, and platform assistance without requiring large investments or outlay to manage and operate them. Clouds typically require service providers, infrastructure/resource providers, and service users (or clients). They incorporate applications delivered as services, as well as the hardware and software systems presuming these services. Cloud computing aspects incorporate a pervasive (network-based) access channel; resource pooling; multi-tenancy; automatic and elastic provisioning and release of computing capabilities; and metering of resource usage (typically on a pay-per-use basis). Computing of resources such as processors, network, memory, and storage establish scalability and high availability of computing capabilities. Clouds can dynamically providing these virtual resources to hosted applications or to clients that use them to develop their own applications or to store data. Rapid providing and dynamic reconfiguration of resources help cope with variable demand and ensure optimum resource utilization.
Multi Cloud, Cloud service Provider, Proxy service Provider..
 P. Mell and T. Grance, The NIST Definition of Cloud Comput-ing, special publication 800-145, Nat’l Inst. Standards and Technology, 2011, p. iii + 3.
 R. Thandeeswaran, S. Subhashini , N. Jeyanthi1, M. A. Saleem Durai, “Secured Multi-Cloud Virtual Infrastructure with Improved Performance”, cybernetics and information technologies XII, (2), pp. 1-22,2012
 P. Mell and T. Grance, “Perspectives on Cloud Computing and Standards, NIST Information Technology Laboratory,” Nat’l Inst. Standards and Technology, 2008; http://csrc.nist. gov/groups/SMA/ispab/documents/minutes/2008-12/cloudcomputing- standards_ISPAB-Dec2008_P-Mell.pdf.
 R. Wu, G.J. Ahn, and H. Hu, “Towards HIPAA-Compliant Healthcare Systems,” Proc. 2nd ACM Int’l Symp. Health In-formatics (IHI 12), ACM, 2012, pp. 593-602.
 N.R. Adam and J.C. Wortmann, “Security-Control Methods for Statistical Databases: A Comparative Study,” ACM Com-puting Surveys, Mar. 1989, pp. 515-556.