Security in Hybrid Cloud

As the cloud computing is spreading around the world, need of inter cloud communication is becoming a growing in the organizations. It is causing the researchers to focus on first, making it possible to communicate between two or more clouds and second security of communication is to considered up to utmost level. With emergence of cloud computing, the term "Hybrid Topology" or "Hybrid Deployment" is becoming more and more common. Definition of "Hybrid Topology" is when you join different cloud deployments into one connected cluster. Another area of research is to focus on communication between a cloud and non cloud computing system. Hybrid Cloud computing mainly deals with working of data centers where different software are installed with huge of growing data to provide information to the users of the system. The techniques which can be used in hybrid cloud securities can be built around the encryption and decryption of data, key based security algorithms which are mainly oriented on authentication and authorization techniques as in wired and wireless networks. One such mechanism is to share the challenge text between the clouds before actual communication should start for authentication. The various works done in this area till date are oriented on other techniques of security between the two or more clouds in a hybrid cloud.

[1]  K. Sankar,et al.  On-Demand Security Architecture for Cloud Computing , 2014 .

[2]  Weidong Liu,et al.  Security Issues and Solutions in Cloud Computing , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[3]  Maya Daneva,et al.  Cloud computing security requirements: A systematic review , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).

[4]  Bu-Sung Lee,et al.  A Systematic Framework Enabling Automatic Conflict Detection and Explanation in Cloud Service Selection for Enterprises , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[5]  Zhang Yongsheng,et al.  Cloud computing and cloud security challenges , 2012, 2012 International Symposium on Information Technologies in Medicine and Education.