Reference Hub1
An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification

An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification

Koushik S., Annapurna P. Patil
Copyright: © 2022 |Volume: 13 |Issue: 1 |Pages: 21
ISSN: 1941-6237|EISSN: 1941-6245|EISBN13: 9781683180647|DOI: 10.4018/IJACI.293148
Cite Article Cite Article

MLA

Koushik S., and Annapurna P. Patil. "An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification." IJACI vol.13, no.1 2022: pp.1-21. http://doi.org/10.4018/IJACI.293148

APA

Koushik S. & Patil, A. P. (2022). An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification. International Journal of Ambient Computing and Intelligence (IJACI), 13(1), 1-21. http://doi.org/10.4018/IJACI.293148

Chicago

Koushik S., and Annapurna P. Patil. "An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification," International Journal of Ambient Computing and Intelligence (IJACI) 13, no.1: 1-21. http://doi.org/10.4018/IJACI.293148

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud Computing is one of the most popular platforms in recent times and has many services to offer. The resources are deployed on the Cloud and are made available to cloud users over high-speed internet connectivity. Many enterprises think of migrating the data or application hosted from one Cloud to another based on the requirements. Migration from one Cloud to another Cloud requires security as it is vital for any data. This article presents a novel secure framework called ‘InterCloudFramework,’ considering well-established criteria to migrate various services across clouds with minimal supervision and interruption. Security is the primary concern to migrate the data among inter-clouds. The study incorporates the Elliptical-Curve Diffie-Hellman algorithm to encrypt the data and Merkle Hash Trees to check the integrity of the data. In addition to security during migration, the framework reduces the migration time of data or applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.