Security in Hybrid Cloud

Authors

  • Anukrati Dubey

  • Gunjita Shrivastava

  • Gunjita Shrivastava

Keywords:

cloud computing; hybrid cloud; challenge text; security

Abstract

As the cloud computing is spreading around the world, need of inter cloud communication is becoming a growing in the organizations. It is causing the researchers to focus on first, making it possible to communicate between two or more clouds and second security of communication is to considered up to utmost level. With emergence of cloud computing, the term "Hybrid Topology" or "Hybrid Deployment" is becoming more and more common. Definition of "Hybrid Topology" is when you join different cloud deployments into one connected cluster. Another area of research is to focus on communication between a cloud and non cloud computing system. Hybrid Cloud computing mainly deals with working of data centers where different software are installed with huge of growing data to provide information to the users of the system. The techniques which can be used in hybrid cloud securities can be built around the encryption and decryption of data, key based security algorithms which are mainly oriented on authentication and authorization techniques as in wired and wireless networks. One such mechanism is to share the challenge text between the clouds before actual communication should start for authentication. The various works done in this area till date are oriented on other techniques of security between the two or more clouds in a hybrid cloud.

How to Cite

Anukrati Dubey, Gunjita Shrivastava, & Gunjita Shrivastava. (2013). Security in Hybrid Cloud. Global Journal of Computer Science and Technology, 13(B2), 1–5. Retrieved from https://computerresearch.org/index.php/computer/article/view/162

Security in Hybrid Cloud

Published

2013-05-15