Security in Hybrid Cloud

Article ID

CSTBA9IPI

Security in Hybrid Cloud

Anukrati Dubey
Anukrati Dubey Shri ram institute of technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Gunjita Shrivastava
Gunjita Shrivastava shri ram institute of technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Sandeep Sahu
Sandeep Sahu
DOI

Abstract

As the cloud computing is spreading around the world, need of inter cloud communication is becoming a growing in the organizations. It is causing the researchers to focus on first, making it possible to communicate between two or more clouds and second security of communication is to considered up to utmost level. With emergence of cloud computing, the term “Hybrid Topology” or “Hybrid Deployment” is becoming more and more common. Definition of “Hybrid Topology” is when you join different cloud deployments into one connected cluster. Another area of research is to focus on communication between a cloud and non cloud computing system. Hybrid Cloud computing mainly deals with working of data centers where different software are installed with huge of growing data to provide information to the users of the system. The techniques which can be used in hybrid cloud securities can be built around the encryption and decryption of data, key based security algorithms which are mainly oriented on authentication and authorization techniques as in wired and wireless networks. One such mechanism is to share the challenge text between the clouds before actual communication should start for authentication. The various works done in this area till date are oriented on other techniques of security between the two or more clouds in a hybrid cloud.

Security in Hybrid Cloud

As the cloud computing is spreading around the world, need of inter cloud communication is becoming a growing in the organizations. It is causing the researchers to focus on first, making it possible to communicate between two or more clouds and second security of communication is to considered up to utmost level. With emergence of cloud computing, the term “Hybrid Topology” or “Hybrid Deployment” is becoming more and more common. Definition of “Hybrid Topology” is when you join different cloud deployments into one connected cluster. Another area of research is to focus on communication between a cloud and non cloud computing system. Hybrid Cloud computing mainly deals with working of data centers where different software are installed with huge of growing data to provide information to the users of the system. The techniques which can be used in hybrid cloud securities can be built around the encryption and decryption of data, key based security algorithms which are mainly oriented on authentication and authorization techniques as in wired and wireless networks. One such mechanism is to share the challenge text between the clouds before actual communication should start for authentication. The various works done in this area till date are oriented on other techniques of security between the two or more clouds in a hybrid cloud.

Anukrati Dubey
Anukrati Dubey Shri ram institute of technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Gunjita Shrivastava
Gunjita Shrivastava shri ram institute of technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Sandeep Sahu
Sandeep Sahu

No Figures found in article.

Anukrati Dubey. 2013. “. Global Journal of Computer Science and Technology – B: Cloud & Distributed GJCST-B Volume 13 (GJCST Volume 13 Issue B2): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Article Matrices
Total Views: 9389
Total Downloads: 2490
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security in Hybrid Cloud

Anukrati Dubey
Anukrati Dubey Shri ram institute of technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Gunjita Shrivastava
Gunjita Shrivastava shri ram institute of technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Sandeep Sahu
Sandeep Sahu

Research Journals