Open Access Open Access  Restricted Access Subscription or Fee Access

Deploying Application in Cloud Environment with Multi Level Authentication and Disaster Recovery

Pradeep Gurunathan, Dr. Seethalakshmi Pandian, Arjun Murali, Mullainathan Subramanian

Abstract


The application deployment in cloud is generic but a challenging task. The securing of cloud is highly recommended by the cloud users. In order to achieve the security, a multi-level authentication is addressed. In this paper, we focused on data centric and service centric in the cloud. The storing of data, application and supported files of the application as data centric, the service of application are treated as software as a service (SaaS). To avoid collusion, we maintained data service and software service separately and hence load balancing of the services. The possibility of data loss by cyber-crime or physical causes is reduced and the recovery of cloud by recovery options to manage the guaranteed services.

Keywords


Cloud Computing, Disaster Recovery, Multi-Level Authentication.

Full Text:

PDF

References


ARMBRUST M, FOX A, GRIFFITH R, et al. “Above the Clouds: A Berkeley View of Cloud Computing” [R]. Berkeley, CA,USA: University of California, 2009.

Bao Zhang, Changgen Peng, Zhipin Xu,"Identity-based distributed cloud storage encryption scheme" Guizhou University.2011, pp 610-614.

D. Boneh, M. Franklin. “Identity-based Encryption from The Weil Pairing”. In Advances in Cryptology-Crypto 2001. Berlin: Springer-Berlag,2001.213-219.

Craig Gentry. “A Fully Homomorphic Encryption Scheme”. PhDthesis,Stanford University, 2009. http://crypto.stanford.edu/craig.

Dai Yuanshun. “The Brief Review of Cloud Computing Technologies”.Information and Communications Technologies. 2010.2,pp 29-35.

Y. Desmedt, Y. Frankel. “Threshold cryptosystems”. Proc.of CRYPTO'89, California USA,1990:307- 315 .

Hongwei Li, Yuanshun Dai1, Bo Yang “Identity-Based Cryptography for Cloud Security” University of Tennessee, Knoxville, USA. Pp 1 -9.

Marten Van Dijk, Ari Juels. ”On The Impossibility of Cryptography Alone for Privacy-preserving Cloud Computing”. 21 May 2010. http://eprint.iacr.org/201 0/305.

QU Ming-cheng, WU Xiang-hu,; LIAO Ming-hong, et al. “A Disaster-Tolerant Storage Model and a Low Data Failure Model for Data Grid”. Acta Electronica Sinica. 2010.38(2),pp 315-320.

A. Shamir. “Identity-based Cryptosystems and Signature Schemes”. In Advances in Cryptology-Crypto1984. Berlin: Springer-Verlag, 1984. pp47-53.

Yongfeng Huang, Jiuling Zhang, Xing Li. ”Encrypted Storage and Its Retrieval in Coud Sorage Aplications”. ZTECOMMUNICATIONS.2010,16 (4): 33-35.

ZHOU Ke, WANG Hua, and LI Chunhua. “Cloud Storage Technology and Its Application”, ZTE Communications, 2010.16(4),pp 24-27.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.