Compusoft, 2 (12), 404-409 PDF
Compusoft, 2 (12), 404-409 PDF
Compusoft, 2 (12), 404-409 PDF
ISSN:2320-0790
parulndr@gmail.com
Abstract: Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud
computing environment a user can use applications without installing, and accessing personal files of any other user in the
network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The
practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable
computing needs grow. However, one of the most important challenges for the cloud as the backup and protection of data and
processes information from users. Security of cloud computing environment is a new research area, the further development of
both the associations of academic and industrial research. In order to create secure and reliable services in cloud computing
environment is major concerning issue.
This paper focuses more on the subject related to the securely resource sharing and privacy aspects in cloud computing
environment, such as data integrity, data compromise, service availability. It proposes a new approach An Approach to Secure
Resource Sharing Algorithm (SRSA) for Multi Cloud Environment. It is based on multi-cloud service providers and the secret
sharing key with object oriented hierarchy. This approach mainly considers three clouds in which bursting and aggregation
operation had been performed and includes many object oriented aspects based on some parameter were analyzed. We also used
secure sharing mechanism so that the cloud resources are shared among different cloud environment.
Keywords Cloud Computing, Cloud environment, Resource sharing.
I.
INTRODUCTION
404
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
II.
405
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
3.
4.
2.
for
III.
RECENT SCENARIO
The single cloud service provider does not provide any type
of security so researcher moves to multi-cloud environment:
1.
406
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
Part-I
First part of algorithm opens the environment to cloud 1 for
performing aggregation and bursting on C++ files. This
algorithm calculate several object oriented properties like
class and object and according to those values perform
aggregation and bursting is done.
PartII
Second part of algorithm opens the environment to cloud 2
for performing aggregation and bursting on Java files. This
algorithm calculate several object oriented properties like
class and object and according to those values perform
aggregation and bursting is done.
Part-III
Third part of algorithm opens the environment to cloud 3 for
performing aggregation and bursting on C# files. This
algorithm calculate several object oriented properties like
class and object and according to those values perform
aggregation and bursting is done.
Part-IV
In the final phase of operating resources sharing between
clouds are done by using security key to stop unauthorized
access. Authorized person can access the cloud and share
the resources from one cloud to another cloud.
V.
PROPOSED ALGORITHM
If (Cloud1)
{
[Select the C++ file for aggregation]
Select */col1, col2coln from tablename;
[Show the table with their Parameters]
Select */col1, col2coln from tablename where condition;
[Select Object oriented Concept]
If (class)
CClass++;
If(CObject)
CObject++;
[Print the parameter according to the count of classes and
object]
}
Else If (Cloud2)
{
[Select the Java file for aggregation]
Select */col1, col2coln from tablename;
[Show the table with their Parameters]
Select */col1, col2coln from tablename where condition;
[Select Object oriented Concept]
If (class)
CClass++;
If (CObject)
CObject++;
[Print the parameter according to the count of classes and
object]
}
IV.
PROPOSED METHOD
407
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
Else If (Cloud3)
{
[Select the C# file for aggregation]
Select */col1, col2coln from tablename;
[Show the table with their Parameters]
Select */col1, col2coln from tablename where condition;
[Select Object oriented Concept]
If (class)
CClass++;
If (CObject)
CObject++;
[Print the parameter according to the count of classes and
object]
}
[Enter the password for Sharing]
Else if (Sharing)
{
If (Cloud n)
{
[Enter the Key]
If (Key)
[Share the attribute]
{
Select the attribute to be shared
}
Else
[Not Authorized]
}
}
Else
{
Exit (0)
}
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
408
http://csrc.nist.gov/groups/SNS/cloudcomputing/clouddef-v 15.doc.
Cloud Security Alliance, Top Threats to Cloud
Computing v1.0, Prepared by the Cloud Security
Alliance, March 2010, pp. 1-14.
Jouni Menp, Cloud Computing with the Azure
Platform, TKK T-110.5190 Seminar on Internet
Working, April 27, 2009.
Feng-Tse Lin, Teng-San Shih, Cloud Computing:
The Emerging Computing Technology, ICIC
Express Letters Part B: Applications (ISSN: 21852766), v1, September 2010, pp. 33-38.
http://aws.amazon.com
Amazon Web Service, Amazon Elastic Compute
Cloud, User Guide, API Version, August 31, 2010.
Google,
Google
app
Engine,
http://code.google.com/appengine.
http://www.salesforce.com.
Sun Microsystems, Introduction to Cloud
Computing Architecture, White paper, 1st Edition,
June 2009, pp. 1-40.
Sayaka Akioka and Yoichi Muraoka, HPC
Benchmarks on Amazon EC2, 24th International
Conference on Advanced Information Networking
and Applications Workshops (WAINA), April 2023, 2010, IEEE, pp. 1029-1034.
Marko Vukolic, The Byzantine Empire in the
Intercloud, ACM SIGACT News, Volume 41
Issue 3, September, 2010, pp. 105-111.
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim
Weatherspoon, RACS: a case for cloud storage
diversity, Proceedings of the 1st ACM symposium
on Cloud computing, Indianapolis, IN, Jun10-11,
2010, pp. 229-240.
Yi Hu, Bin Gong, Fengyu Wang, Cloud ModelBased Security-aware and Fault-Tolerant Job
Scheduling for Computing Grid, 2010 Fifth
Annual China Grid Conference, July 16-18, 2010,
IEEE, pp. 25-30.
Hai Zhong, Kun Tao, Xuejie Zhang, An Approach
to Optimized Resource Scheduling Algorithm for
Open-source Cloud Systems, 2010 Fifth Annual
China Grid Conference (China Grid), July 16-18,
2010, IEEE, pp. 124-129.
Yu Weng, Changjun Hu, Xiaoming Zhang, Huayu
Li, Alert Monitoring Cloud: Psychological Health
Analysis of Web Text in Cloud, 2010 Fifth
Annual China Grid Conference (China Grid), July
16-18, 2010, IEEE, pp. 152-159.
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
[16]
[17]
[18]
[19]
409