Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


April Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the April 2021 Edition of the journal. The last date of research paper submission is March 15, 2021.

Data Security in Multi-cloud Environment – A Survey

Vaishali Tupe, Vidyullata Devmane Published in Cloud Computing

IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization
Year of Publication: 2015
© 2015 by IJAIS Journal
Download full text
  1. Vaishali Tupe and Vidyullata Devmane. Article: Data Security in Multi-cloud Environment A Survey. IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization ICWCCV 2015(1):6-9, September 2015. BibTeX

    	author = "Vaishali Tupe and Vidyullata Devmane",
    	title = "Article: Data Security in Multi-cloud Environment  A Survey",
    	journal = "IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization",
    	year = 2015,
    	volume = "ICWCCV 2015",
    	number = 1,
    	pages = "6-9",
    	month = "September",
    	note = "Published by Foundation of Computer Science, New York, USA"


Cloud computing is a powerful platform; it delivers IT (Information Technology) resources as a services over the Internet. It uses their own infrastructure to maintain customer's application and data. The cloud service provider offers platform, software and infrastructure as a service to the customer on pay per use basis. It may be either single cloud or multi cloud environment. Single cloud service provider is not reliable due to data security risk. In this survey paper various security issues in single cloud environment and requirement of switching from single cloud environment to multi cloud environment are discussed. Multi cloud environment has ability to reduce security risk of single cloud.


  1. Amazon elastic compute cloud (EC2). http://www. amazon. com/ec2/ (18. 07. 08).
  2. Amazon simple storage service (S3). http://www. amazon. com/s3/ (18. 07. 08
  3. Amazon, Amazon Web Services. Web service licensing agreement, October3, 2006.
  4. Buyya Rajkumar, Yeo Chee Shin, Venugopal Srikumar, Broberg James and Brandic Ivona, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility", Future Generation Computer Systems (2009), pp. 599-616
  5. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
  6. Gandotra Indu, Abrol Pawanesh, Gupta Pooja, Uppal Rohit and Singh Sandeep (2011), "Cloud Computing Over Cluster, Grid Computing: a Comparative Analysis", Journal of Grid and Distributed Computing, pp-01-04
  7. Google app engine. http://appengine. google. com (18. 07. 08).
  8. Jaydip Sen, "Security and Privacy Issues in Cloud Computing"; Innovation Labs, Tata Consultancy Services Ltd. , Kolkata, INDIA
  9. Microsoft azure. http://www. microsoft. com/azure/ (30. 10. 08).
  10. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom, "Cloud Computing Security: From Single to Multi-Clouds", 2012, 45th Hawaii International Conference on System Sciences
  11. (National Institute Standard and Technology), http://www. nist. gov/itl/cloud/
  12. Sun network. com (Sun grid). http://www. network. com (18. 07. 08).
  13. Ronald L. Krutz Russell Dean Vine, "A Comprehensive Guide to Secure Cloud Computing".


Data integrity, data intrusion, data availability