Hybrid Cloud Computing and Security Challenges in Hybrid Cloud

Authors

  • K Aswini  Department of MCA, Sree Vidyanikethan Institute of Management, Sri Venkateswara University, Tirupati, Andhra Pradesh, India
  • B Masthan Baba  Assistant Professor, Department of MCA, Sree Vidyanikethan Institute of Management,.Rangampeta, Tirupati, Andhra Pradesh, India

Keywords:

Cloud Computing; Hybrid Cloud; Challenge Text; Security.

Abstract

As the cloud computing is spreading the world over, need of entomb cloud communication is turning into a developing in the associations. It is making the scientists center around to begin with, making it conceivable to convey between at least two clouds and second security of communication is to considered up to most extreme level. With rise of cloud computing, the expression "Hybrid Topology" or "Hybrid Deployment" is ending up increasingly normal. Meaning of "Hybrid Topology" is the point at which you join diverse cloud arrangements into one associated cluster. Another zone of research is to center around communication between a cloud and non cloud computing framework. Hybrid Cloud computing primarily manages working of server farms where distinctive software’s are introduced with enormous of developing information to give data to the clients of the framework. The methods which can be utilized as a part of hybrid cloud securities can be worked around the encryption and decoding of information, key based security algorithms which are basically situated on validation and approval systems as in wired and remote systems. One such instrument is to share the test message between the clouds previously genuine communication should begin for validation. The different works done around there till date are arranged on different procedures of security between the at least two clouds in a hybrid cloud.

References

  1. Chunqing Chen, Shixing Yan, Gupublicg Zhao, Bu Sung Lee, "A Systematic Framework Enabling Automatic Conflict Detection and Explanation in Cloud Service Selection for Enterprises", 2012 IEEE Fifth International Conference on Cloud Computing, 978-0-7695-4755-8 2012 IEEE DOI 10.1109/- CLOUD.2012.95.
  2. Jianyong Chen, Yang Wang, and Xiaomin Wang "On-Demand Security Architecture for Cloud Computing ", 0018-9162 2012 IEEE.
  3. Iliana Iankoulova, Maya Daneva, "Cloud Computing Security Requirements: a Systematic Review", 978- 1-4577-1938-7 2011 IEEE.
  4. Eman M.Mohamed, Hatem S. Abdelkader, Sherif EIEtriby, "Enhanced Data Security Model for Cloud Computing", The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May, 2012.
  5. Safwan Mahmud Khan and Kevin W. Hamlen, "Hatman: Intra-cloud Trust Management for Hadoop", 2012 IEEE Fifth International Conference on Cloud Computing, 978-0-7695-4755-8/ 2012 IEEE DOI 10.1109/CLOUD.2012.64.
  6. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom, "Cloud Computing Security: From Single to Multi-Clouds" 2012 45th Hawaii International Conference on System Sciences 978- 0-7695-4525-7/12 2012 IEEE DOI 10.1109/- HICSS.2012.153.
  7. Deyan Chen, Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing" 2012 International Conference on Computer Science and Electronics Engineering 978-0-7695-4647-6/12 2012 IEEE DOI 10.1109/ICCSEE.2012.193.
  8. Zhang Yandong, Zhang Y ongsheng, "Cloud Computing and Cloud Security Challenges" 2012 International Symposium on Information Technology in Medicine and Education.
  9. Fan, Chih-Tien; Wang, Wei-Jen; Chang, Yue- Shan; High Performance Computing and Communications (HPCC), 2011 IEEE 13th International Conference on Publication Year: 2011, Page(s): 887 – 892.
  10. Gul, I.; ur Rehman, A.; Islam, M.H.; Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on Publication Year: 2011, Page(s): 143 – 148.
  11. Mazhelis, Oleksiy; Tyrvainen, Pasi; Software Engineering and Advanced Applications (SEAA), 2011 37th EUROMICRO Conference on Digital Object Identifier: 10.1109/SEAA.2011.29 Publication Year: 2011, Page(s): 138.
  12. Research on Cloud Computing Security Problem and Strategy Wentao Liu Department of Computer and Information Engineering, Wuhan Polytechnic University, Wuhan Hubei Province 430023, China 978-1-4577-1415-3/2012 IEEE.
  13. Pengfei You, Yuxing Peng, Weidong Liu, Shoufu Xue "Security Issues and Solutions in Cloud Computing" 32nd International Conference on Cloud Computing Systems Workshops, 1545-0678 2012 IEEE DOI 10.1109/ICDCSW.2012.20.
  14. Iliana Iankoulova, Maya Daneva, "Cloud Computing Security Requirements: a Systematic Review", 978- 1-4577-1938-7 2011 IEEE

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
K Aswini, B Masthan Baba, " Hybrid Cloud Computing and Security Challenges in Hybrid Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.01-07, March-April-2018.