Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment

2015 ◽  
Vol 24 (4-6) ◽  
pp. 109-117 ◽  
Author(s):  
S. Srisakthi ◽  
A. P. Shanthi
2020 ◽  
Vol 12 (2) ◽  
pp. 102-120
Author(s):  
Mohammad M. Alshammari ◽  
Ali A. Alwan ◽  
Azlin Nordin ◽  
Abedallah Zaid Abualkishik

Cloud computing has become a desirable choice to store and share large amounts of data among several users. The two main concerns with cloud storage are data recovery and cost of storage. This article discusses the issue of data recovery in case of a disaster in a multi-cloud environment. This research proposes a preventive approach for data backup and recovery aiming at minimizing the number of replicas and ensuring high data reliability during disasters. This approach named Preventive Disaster Recovery Plan with Minimum Replica (PDRPMR) aims at reducing the number of replications in the cloud without compromising the data reliability. PDRPMR means preventive action checking of the availability of replicas and monitoring of denial of service attacks to maintain data reliability. Several experiments were conducted to evaluate the effectiveness of PDRPMR and the results demonstrated that the storage space used one-third to two-thirds compared to typical 3-replicas replication strategies.


2019 ◽  
Vol 7 (1) ◽  
pp. 30-38
Author(s):  
P. Sen ◽  
D.Sarddar . ◽  
S.K. Sinha ◽  
R. Pandit

2019 ◽  
Vol 23 (2) ◽  
pp. 797-836 ◽  
Author(s):  
Seyedeh Yasaman Rashida ◽  
Masoud Sabaei ◽  
Mohammad Mehdi Ebadzadeh ◽  
Amir Masoud Rahmani

Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Author(s):  
Cheng Zhang ◽  
Yang Xu ◽  
Yupeng Hu ◽  
J. Wu ◽  
Ju Ren ◽  
...  

Author(s):  
Igor Sfiligoi ◽  
David Schultz ◽  
Benedikt Riedel ◽  
Frank Wuerthwein ◽  
Steve Barnet ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document