A Secure Framework for Cloud Computing With Multi-cloud Service Providers

Cloud computing conveys IT assets as a Service over web. The point of interest of cloud computing is everlasting anyway it brings a ton of issues together with security. ensuring the security of cloud computing may be a premier consider the computing climate, as clients generally store touchy data with cloud storage suppliers, however these suppliers could likewise be untrusted Customers don't have to lose their delicate data attributable to malignant insiders and programmers inside the cloud. Furthermore, the loss of administration accessibility has created a few issues for an oversized scope of as of late. Information interruption system create a few issues for the clients of distributed computing. The inverse issues like data burglary, data lost should be overcome to supply higher administrations to the customers. It's resolved that the investigation into the occupation of intercloud suppliers to deal with security has gotten less consideration from the examination group than has the livelihood of single mists. Multi-cloud environment has capacity to scale back the dangers further on the grounds that it will verify the security and responsibleness. We tend to propose protection and security to cloud clients with less calculation cost and most astounding security. Amid this paper, we've made a framework to give secure cloud data which will promise to stop security dangers confronting the cloud computing group. This schema connected multi-clouds furthermore the blowfish algorithm to scale back the chance information interruption furthermore the loss of administration accessibility inside the cloud and assurance information honesty. By using that Multi-cloud architecture we tend to actualize cryptography and coding of client data with 2 real clouds dropbox and cloudme. We tend to propose Blowfish algorithm as partner in nursing sample of hearty security framework with higher execution as an occurrence the anticipated

[1]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[2]  Marko Vukolic,et al.  The byzantine empire in the intercloud , 2010, SIGA.

[3]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[4]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[5]  Michael K. Reiter,et al.  Efficient Byzantine-tolerant erasure-coded storage , 2004, International Conference on Dependable Systems and Networks, 2004.

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  William Stallings,et al.  Cryptography and network security , 1998 .

[8]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..