IJSTE

CALL FOR PAPERS : Feb-2026

Submission Last Date
25-Feb-26
Submit Manuscript Online

FOR AUTHORS

FOR REVIEWERS

ARCHIEVES

DOWNLOADS

Open Access



CopyScape
Creative Commons License

A Secure Strategy Using Weighted Active Monitoring Load Balancing Algorithm For Maintaining Privacy In Multi-Cloud Environments


Author(s):

T.SIVASANKARI , IFET College Of Engineering; S.SIVASANKARAN, IFET College Of Engineering

Keywords:

Cloud computing, single cloud, multi cloud, public cloud, cloud storage, data integrity, data intrusion, service availability

Abstract:

Cloud Computing is the latest technology that is used by any organizations in this competitive world. As many organizations are using cloud computing, the major issue that has risen is security. In single cloud there are many security issues and the possibility of malicious insiders is also high. But in multi clouds the security issues has become less for the users and for the people in the research group. As the multi clouds provide the solutions rose in the security of a Single cloud the movement towards multi clouds is increased. The multi cloud deals with the security issues like data integrity, data intrusion and service availability in the cloud. Even though we cannot assure complete security in the multi-clouds. This is because if the hacker attacks the server which is related to the multi cloud environment he can easily hack our valuable information. In this Paper concentrate public cloud and also achieve the Load Balancing using WAM (Weighted Active Load Monitoring)Load Balancer Algorithm. The multi -cloud motivates the need for effective cloud security counter measures. The basic underlying is to use multiple distinct clouds at same time to mitigate the risk of malicious data manipulation, disclosure and process tempering. a typical way of database splitting is pseudonymization , one provider receives the data with some key fields(typical personal identification data link, address) replaced by a random identifier, and the second provider receives the mapping of the identifier to the original information. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.


Other Details:

Manuscript Id :IJSTEV1I10062
Published in :Volume : 1, Issue : 10
Publication Date: 01/05/2015
Page(s): 232-237
Download Article

IMPACT FACTOR

4.753

NEWS & UPDATES

Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

1

1

GLOBAL INDEXING



















Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved