Open Access Open Access  Restricted Access Subscription or Fee Access

Empowering Security and Performance of TPA Pertinent in Single Cloud to Multi-Cloud

R. Sugumar, Dr. A. Rajesh, T.S. Karthick


The use of cloud computing has increased rapidly in many organizations and it also deployed in technologies like 3G, 4G and pervasive applications. Ensuring the security of cloud computing is a major factor in the cloud computing environment as users often store sensitive information with cloud storage providers (CSP), but these providers may be untrusted. Even though a TPA audits the users data with correctness and integrity, dealing with single cloud providers is predicted to become less popular with service availability failure, possibility of malicious insiders and Byzantine faults in the single cloud.  A movement towards Multi-Clouds or in other words inter-clouds or clouds- of- clouds has emerged recently; hence we need to protect the user data in Multi-Clouds with greater security in the form of public batch auditing and dynamic certification to perform continuous monitoring from single to Multi-Clouds, by this, it  is to implement Cipher text – Policy Attribute Based Encryption(CP-ABE)[6] to achieve secure data sharing and also provides forward and data sharing and also provides forward and backward security  in cloud computing to improve the security and performance with many number of users using the single to multi cloud environment[18].


TPA (Third Party Auditor), CSP (Cloud Service Provider), CP-ABE (Cipher Text Policy Attribute based Encryption), TPACA (Third Party Auditor Certificate Authority)

Full Text:



An Efficient Public Batch Auditing Protocol for Data Security in Multi-Cloud Storage He Kai, Huang Chuanhe+, Wang Jinhai, Zhou Hao, Chen Xi, Lu Yilong, Zhang Lianzhen, Wang Bin Computer School, Wuhan University, Wuhan, China- 2013 8th Annual ChinaGrid Conference.

Data Storage Security Challenges in Cloud computing, Sajjad Hashemi1 1Department of Computer Engineering, Science and Research Branch, Islamic Azad University, West Azarbayjan, Iran- International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013.

Using Third Party Auditor for Cloud Data Security: A Review Ashish Bhagat Department Of Computer Science & Engineering, India Lovely Professional University, Ravi Kant Sahu School of Computer Engineering, Lovely Professional University India. International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013.

Article:The Edge of the Cloud Maria R. Ebling IBM T.J. Watson Research Center Eyal de Lara University of Toronto Alec Wolman Microsoft Research Ada Gavrilovska Georgia Institute of Technology.

Ensuring Privacy in Data Storage as a Service for Educational Institution in Cloud Computing J. Angela Jennifa Sujana Asst. Professor, Department of Information Technology Mepco Schlenk Engg. College Sivakasi, India , Dr. T. Revathi Professor, Department of Information Technology Mepco Schlenk Engg. College Sivakasi, India - 2012 International Symposium on Cloud and Services Computing.

Expressive, Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage Kan Yang, Student Member, IEEE, Xiaohua Jia, Fellow, IEEE- IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS.

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Boyang Wang †,††, Baochun Li †† and Hui Li † † State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an, China †† Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada- 2012 IEEE Fifth International Conference on Cloud Computing.

Survey on Cloud Data Integrity Proof Techniques Solomn Guadie worku, Zhong Ting, Qin Zhi-Guang School of computer science and engineering University of Electronic Science and Technology of China (UESTC) Chengdu, China- 2012 Seventh Asia Joint Conference on Information Security.

TSAS:Third-Party Storage Auditing Service-

QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems Jenn-Wei Lin, Chien-Hung Chen, and J. Morris Chang, Senior Member, IEEE- IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 1, JANUARY-JUNE 2013.

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U1, Madonna Arieth R2, Geethanjali K3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry University, India. 3Asst.Professor, Dept of EEE, RVS College of Engineering& Technology, Pondicherry University, India.- International Journal of Emerging Technology and AdvancedEngineering Website: (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 7, July 2013).

Dynamic certification of cloud services,by Iryna Windhorst and Ali SunyaevIEEE International conference on Availability, reliability and security, 2013.

security issues in cloud computing, Huaglory Tianfield.2012, IEEE International conference of systems,man and cybernetics.

Secure storage services in cloud computing, S.Muthakshi, Dr.T.Meyyappan. Dept.cse, Alagappa University, karaikudi, TamilNadu, India, IJCTT vol4. Jun13.

Cloud computing security: From single to multi-clouds, Md. A.AlZain.. 2012 45th Hawaii International conference on system sciences.

CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, Rodrigo N. Calheiros1, Rajiv Ranjan2, Anton Beloglazov1, C´esar A. F. De Rose3 and Rajkumar Buyya1,∗,† SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. Exper. 2011; 41:23–50 Published online 24 August 2010 in Wiley Online Library ( DOI: 10.1002/spe.995

A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric opportunistic Networks, FeiWang,1,2 YongJun Xu,1 LinWu,1,2 Longyijia Li,3 Dan Liu,3 and Liehuang Zhu3, International Journal of Distributed Sensor Networks Volume 2013, Article ID 469076


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.