Rahul Pradev. R, Hari. S, Dr. Balakumar. P, Kapila Vani. R. K


Cloud computing induced tremendous number of stakeholders who can outsource the resources at various levels. The security implementations towards for the user’s satisfaction has been a major challenge for all the cloud service providers. Even though various security methodologies are adopted, there may rise some breaches or lack of concentration or carelessness by the stakeholders, using which the intruders can penetrate and act upon the information over the cloud. To avoid those categories of disasters and to serve the customers back with their initial atomic information, the cloud service is coupled with a third-party verifier. We propose a verifier who monitors the transitions and actions over the cloud in random selections, and performs recovery, if the information has been affected. The intruder’s most liked information, over which the corruption occurs, is dynamically reallocated after it is rectified to its initial state by the verifier. Hence, we implement a new architecture, where the verifier is established as an intermediate between the users and the service providers. To enhance security the information is split into blocks and stored in multi-cloud environment, so exact retrieval of the entire information by hackers becomes tedious and impossible.


Blocks spilt, dynamic reallocation, multi-cloud, recovery, verifier.

Full Text:



Sebasitin Lins, Stephan Schneider and Ali sunyaev, “Trust is good,control is better: creating secure clouds by continuous auting, IEEE trans. in cloud computing,2015.

K. M. Khan and Q. Malluhi, "Trust in Cloud Services: Providing More Controls to Clients", Computer, vol. 46, no. 7, pp. 94– 96, 2013.H.

I. Windhorst and A. Sunyaev, “Dynamic certification of cloud services”, in Proc. ARES, Regensburg, Germany, 2013.

M. A. Vasarhelyi and F. B. Halper, "The continuous audit of online systems", Auditing, vol. 10, no. 1, pp. 110–125, 1991.

S. Schneider, J. Lansing, F. Gao, and A. Sunyaev, “A taxonomic perspective on certification schemes”, in Proc. HICSS, Big Island, Hawaii, USA, 2014, pp. 1–10.

K. Singh, P. J. Best, M. Bojilov, and C. Blunt, "Continuous auditing and continuous monitoring in ERP environments", Inf.

P. Stephanow, C. Banse, and J. Schütte, “Generating Threat

Profiles for Cloud Service Certification Systems”, in 17th IEEE High Assurance Systems Engineering Symposium (HASE), 2016.

Q. Fu, J.-G. Lou, Y. Wang, and J. Li, “Execution anomaly detection in distributed systems through unstructured log analysis”, in Proc. ICDM, Miami, Florida, USA, 2009, pp. 149–158.

T. C. Du, E. Y. Li, and E. Wei, "Mobile agents for a brokering service in the electronic marketplace", Decis Support Syst, vol.

, no. 3, pp. 371–383, 2005.

R. L. Braun and H. E. Davis, "Computer-assisted audit tools and techniques: analysis and perspectives", Managerial Auditing Journal, vol. 18, no. 9, pp. 725–731, 2003.

J. R. Rajalakshmi, M. Rathinraj, and M. Braveen, “Anonymizing log management process for secure logging in the cloud”, in Proc. ICCPCT, India, 2014, pp. 1559–1564.

W. D. Doyle, “Magnetization reversal in films with biaxial anisotropy,” in 1987 Proc. INTERMAG Conf., pp. 2.2-1–2.2-6.

A survey of cloud computing taxonomies: Rationale and overview, Fahad polash, Abdullah Abuhussein, sajjan shiva, University of mephis.

Towards Continuous cloud service assurance for critical infrastructure, Aleksandar hudic, Thomas Hecht, Markus Tauber, Austrian institute of technology.

An autonomous agent based incident detection system for cloud environments, Frank Doelitzscher, Christoph reich, Martin Knahl and Nathan Clarke, Furtwangen University- Cloud research lab,IEEE trans. on cloud computing,2011.

Monitoring personal data transfers in the cloud, Anderson sasntana de oliverira,Jakub sendor,Alexander garage and Kateiline Jenatton, SAP labs, France.

Way in hacking the cloud using simple techniques,

A study on cloud computing security challenges, Santosh Bulusu and kalyan sudia, Blekinge Institute of technology, Sweden.

Imperva’s Hacker Intelligence Summary Report.

Cloud Computing Security, wikipedia.

Secuity attacks in Stand-alone computer and cloud computing: An analysis


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.