Abstract
The multi cloud architecture improvises the constancy of the system associated with the cloud computing as they offer benefits such as the reducing the severity of the vendor lock in, which is the major impediment to the cloud service adoption. However the information maintenance in the multi cloud architecture is a very tedious and challenging as it inherits multitudes of complexity due to various services rendered, interfaces and technologies used. As storage is the fundamental usage of the cloud computing, the failures in the information maintenance (storage, securing, retrieval) in the traditional cloud computing has led to the development of different techniques that are highly reliable and flexible. The paper also scope in developing one such adaptable and highly secure information maintenance using the Cryptography integrated Computational intelligence (CICI) for application deployment in the multi cloud architecture. The proposed method is validated using the network simulator-Two, to verify the performance augmentation of the multi-cloud architecture in its information maintenance.
References
- Naik, Nitin. "Applying computational intelligence for enhancing the dependability of multi-cloud systems using docker swarm." In 2016 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1-7. IEEE, 2016.
- Banyal, R. K., V. K. Jain, and Pragya Jain. "Data Management System to Improve Security and Availability in Cloud Storage." In 2015 International Conference on Computational Intelligence and Networks, pp. 124-129. IEEE, 2015.
- Ashalatha, Rˡ, Jayashree Agarkhed, and Siddarama Patil. "Data storage security algorithms for multi cloud environment." In 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 686-690. IEEE, 2016.
- Thakur, Anandita Singh, and P. K. Gupta. "Framework to improve data integrity in multi cloud environment." International Journal of Computer Applications 87, no. 10 (2014).
- Horn, Geir, Paweł Skrzypek, Katarzyna Materka, and Tomasz Przeździȩk. "Cost Benefits of Multi-cloud Deployment of Dynamic Computational Intelligence Applications." In Workshops of the International Conference on Advanced Information Networking and Applications, pp. 1041-1054. Springer, Cham, 2019.
- Naik, Nitin. "Docker container-based big data processing system in multiple clouds for everyone." In 2017 IEEE International Systems Engineering Symposium (ISSE), pp. 1-7. IEEE, 2017.
- Ferry, Nicolas, Alessandro Rossini, Franck Chauvel, Brice Morin, and Arnor Solberg. "Towards model-driven provisioning, deployment, monitoring, and adaptation of multi-cloud systems." In 2013 IEEE Sixth International Conference on cloud computing, pp. 887-894. IEEE, 2013.
- Pitchai, R., S. Babu, P. Supraja, and S. Anjanayya. "Prediction of availability and integrity of cloud data using soft computing technique." Soft Computing 23, no. 18 (2019): 8555-8562.
- Mukhopadhyay, Debajyoti, Akash Thakur, Nikhilesh Chaudhari, and Sani Nanekar. "Architecture to Implement Secure Cloud Computing with Elliptic Curve Cryptography." SmartCR 5, no. 3 (2015): 201-208.
- Junghanns, Philipp, Benjamin Fabian, and Tatiana Ermakova. "Engineering of secure multi-cloud storage." Computers in Industry 83 (2016): 108-120.
- Casola, Valentina, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, and Giancarlo Capone. "MUSA deployer: deployment of multi-cloud applications." In 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 107-112. IEEE, 2017.
- Jiao, Lei, Jun Lit, Wei Du, and Xiaoming Fu. "Multi-objective data placement for multi-cloud socially aware services." In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 28-36. IEEE, 2014.
- Raj, Pethuru, and Anupama Raman. "Multi-cloud management: Technologies, tools, and techniques." In Software-Defined Cloud Centers, pp. 219-240. Springer, Cham, 2018.
- GR, Vijay, and A. Rama Mohan Reddy. "An efficient security model in cloud computing based on soft computing techniques." International Journal of Computer Applications 975 (2012): 8887.
- Iqbal, Ummer, and Saima Shafi. "A provable and secure key exchange protocol based on the elliptical curve diffe–hellman for wsn." In Advances in Big Data and Cloud Computing, pp. 363-372. Springer, Singapore, 2019.
- Raj, Jennifer S. "A COMPREHENSIVE SURVEY ON THE COMPUTATIONAL INTELLIGENCE TECHNIQUES AND ITS APPLICATIONS." Journal of ISMAC 1, no. 03 (2019): 147-159.
- Raj, Jennifer S., and S. Smys. "VIRTUAL STRUCTURE FOR SUSTAINABLE WIRELESS NETWORKS IN CLOUD SERVICES AND ENTERPRISE INFORMATION SYSTEM." Journal of ISMAC 1, no. 03 (2019): 188-204.
