Efficiently Managing Storage across Different Cloud Services for Flexible Resource Allocation and Security Integration

Abstract

In the modern landscape, exploiting multiple cloud services stands out as a potent strategy for enhancing both data privacy and accessibility. Our research delves into the cost-effective shift towards multi-cloud storage computing, with a key emphasis on seamlessly integrating on-demand resource provisioning and robust access control policies. By fragmenting datasets across diverse cloud platforms, we bolster privacy while adeptly managing complexities through cutting-edge Multi-Cloud technologies. Our approach dynamically allocates resources and enforces stringent access controls, thus optimizing security and resource utilization. This framework adeptly tackles the challenges associated with managing diverse cloud environments, offering organizations a comprehensive solution for secure and efficient data management in the multi-cloud era.

Country : India

1 R. Nithin2 Dr. R. Nagarajan

  1. Student of PG & Research, Department of Computer Science, Sri Ramakrishna College of Arts & Science, Coimbatore, Tamilnadu, India
  2. Professor of PG & Research, Department of Computer Science, Sri Ramakrishna College of Arts & Science, Coimbatore, Tamilnadu, India

IRJIET, Volume 8, Issue 3, March 2024 pp. 137-140

doi.org/10.47001/IRJIET/2024.803017

References

  1. A.Bhardwaj, F. Al-Turjman, M. Kumar, T. Stephan, and L. Mostarda, ‘‘Capturing-the-invisible (CTI): Behavior-based attacks recognition in IoT-oriented industrial control systems,’’ IEEE Access, vol. 8, pp. 104956–104966, 2020.
  2. M. Kumar, A. Rani, and S. Srivastava, ‘‘Image forensics based on lighting estimation,’’ Int. J. Image Graph., vol. 19, no. 3, Jul. 2019, Art. No. 1950014.
  3. M. Kumar, S. Srivastava, and N. Uddin, ‘‘Image forensic based on lighting estimation,’’ Austral. J. Forensic Sci., vol. 51, no. 3, pp. 243–250, Aug. 2017.
  4. J. Li, Y. Zhang, X. Chen, and Y. Xiang, ‘‘Secure attribute-based data sharing for resource-limited users in cloud computing,’’ Comput. Secur., vol. 72, pp. 1–12, Jan. 2018.
  5. Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, ‘‘Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing,’’ Inf. Sci., vol. 379, pp. 42–61, Feb. 2017.
  6. The OpenStack Project. OSSA-2015-006: Unauthorized Delete of Versioned Swift Object. Accessed: Apr. 14, 2015. [Online]Available: https://security.openstack.org/ossa/OSSA-2015-006.html
  7. The OpenStack Project. OSSA-2015-016: Information Leak Via Swift Tempurls. Accessed: Aug. 26, 2015. [Online]. Available: https://security. openstack.org/ossa/OSSA-2015-016.html
  8. The OpenStack Project. Possible Glance Image Exposure via Swift. Accessed: Feb. 23, 2015. [Online]. Available: https://wiki. openstack.org/wiki/OSSN/OSSN-0025
  9. Cloud Security Alliance. Top Threats to Cloud Computing: Deep Dive. Accessed: Aug. 8, 2018. [Online]. Available: https://downloads. cloudsecurityalliance.org/assets/research/top-threats/top-threats-to-cloud computing-deep-dive.pdf
  10. The OpenStack Project. OpenStack Security Advisories. Accessed: Feb. 2, 2015. [Online]. Available: https://security.openstack.org/ossalist.html