EconPapers    
Economics at your fingertips  
 

Design of cloud-based security model with multiple CSPs

Megha Gupta (), Sakshi Sobti (), Kshipra Jain (), N. Gobi (), Nitish Vashisht () and Zahid Ahmed ()
Additional contact information
Megha Gupta: Noida Institute of Engineering and Technology
Sakshi Sobti: Chitkara University
Kshipra Jain: ATLAS SkillTech University
N. Gobi: Jain (Deemed to Be University)
Nitish Vashisht: Chitkara University
Zahid Ahmed: Vivekananda Global University

International Journal of System Assurance Engineering and Management, 2025, vol. 16, issue 6, No 5, 2066-2077

Abstract: Abstract Although cloud computing (CC) provides information technology (IT) services online, security issues also are brought by it. Consumers frequently save private data with unreliable providers and decentralized computing has problems due to the loss of administrator access. Because multi-cloud settings may lower risk by assuring security and responsibility, investigators have looked into the contribution of inter-cloud suppliers in privateness for improved solutions. Enterprises utilize the advanced encryption standard (AES), a symmetric key encryption method, to safely protect and retrieve data from cloud storage while ensure confidentiality and protection of data for additional users. The Byzantine fault tolerance model (BFTM) is used to verify the accuracy of user input. In research, a novel method augmented advanced encryption standard (AAES) is presented. Absolute protection and data security whilst retrieval and storage are both achieved with the assist of the suggested AAES approach. The performance of the AAES technique become assessed in a simulated environment and at the real-time dataset. The effectiveness of the suggested approach is classified and contrasted with that of other currently used methods. Based at the study’s findings, it can be said that the suggested AAES performs better than present methods in decreasing the threat to cloud protection.

Keywords: Cloud computing (CC); Multi-cloud; Byzantine fault tolerance model (BFTM); Trust; Security; Augmented advanced encryption standard (AAES) (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s13198-025-02805-5 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:16:y:2025:i:6:d:10.1007_s13198-025-02805-5

Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198

DOI: 10.1007/s13198-025-02805-5

Access Statistics for this article

International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar

More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-06-28
Handle: RePEc:spr:ijsaem:v:16:y:2025:i:6:d:10.1007_s13198-025-02805-5