Secure Cloud Bursting, Brokerage, Aggregation using AES Encryption and One Time Authentication Password
Authors: Pooja Keshare, Kapil Sahu
Certificate: View Certificate
Abstract
Cloud bursting is an application deployment model during which an application runs in the private cloud or data center and bursts into public cloud when the actual demand for computing capacity spikes. The advantage of this type of hybrid cloud deployment is make fish an organization only pays with regard to extra compute resources when they are needed. Some organization create own private cloud are interested in leveraging cloud bursting. Conventionally some architecture has run application workload fully in private cloud till workload is not over the threshold value. After cross the threshold value application burst into public cloud for additional compute resources. In this paper, we proposed bridge between multiple clouds and deal with cost and security issue relating to communication between public and private clouds. We extend Security for Computing Cloud Bursting and Aggregation Applying AES encryption, One Time password. We also used secure sharing mechanism so your cloud resources are distributed among different cloud environment and consider some of the security concern for your cloud computing for authorized data sharing between clouds.
Introduction
Cloud computing has emerged as one of the most promising and challenging technologies of our time. Some of the properties that characterize the cloud computing service delivery model are scalability/elasticity, on-demand service provisioning, shared resource pooling, multi-tenancy hosting, utility pay-as-you-use pricing and abstraction of lower layers [1].Cloud computing refers to the delivery of computing resources over the Internet. Rather than storing data on your own hard drive or updating applications for your needs, we use a service over the Internet, we can store, manage and process data rather than local server or personal computer.Doing so may give rise to certain privacy implications [2]. We can access information and computer resources from anywhere if network connection is available. Cloud computing provides a shared pool of computing resources, that is data storage space, networks, processing power, and user applications.
Conclusion
Cloud computing provide a benefits for organizations and individuals. There are secure cloud algorithm which service providers, organizations or consumers could implement as a cryptographically- secure SaaS or PaaS cloud when outsourcing meaningful data, applications, and infrastructure to a virtualized cloud environment. The security of the cloud infrastructure entails protecting the cloud data from any unauthorized access or intrusion by malicious users. Therefore, the research aim of designing a cryptographically secure cloud apps solution which would effectively hide meaningful user data from all external parties to a virtual network- even from the service provider have been achieved. The system if deployed or algorithm adopted promises to improve the existing state of data privacy, and security of cloud data and application environment.
Copyright
Copyright © 2025 Pooja Keshare, Kapil Sahu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.