Kadapa Suneel Kumar


Cloud computing is an emerging model of business computing. In cloud computing, client can use and retrieve the services anytime by using any smart devices to manage complex computing processes and to access very large data storage. The developers have recognized the required of a multi USER storage system that can help in utilizing the cloud power, enhancing its functionality and improve its performance.  In this paper, we discuss the architecture of Multi-user storage System which primarily focuses on the price negotiation mechanism between cloud users and providers. This system presents a perfect way for scalable and open systems that are changed dynamically. The model is based on cooperative and collaborative USERs and is managed. Also this architecture is designed so that it can monitor the user’s jobs while they are being processed.

Key Words: Cloud Computing, Multi-user storage System, Cloud Data Storage, Security Framework and Cloud Service Provider.

Full Text:



Mohammed, A. AlZain, Eric Pardede, Ben Soh& James Thom, A 2012, ‘Cloud Computing Security: From Single to Multi-clouds’, hicss, 45th Hawaii International Conference on System Sciences, pp.5490- 5499.

A.M. Talib, R. Atan, R. Abdullah, and M.A.A. Murad, “A Framework of Multi-USER System to Facilitate Security of Cloud Data Storage” Proc. Annual International Conference on Cloud Computing and Virtualization CCV, Global Science & Technology Forum GSTF, 2010, pp. 241.

H. Shacham, and B. Waters, “Compact proofs of retrievability,” Advances in Cryptology-ASIACRYPT 2010, pp. 90-107.

W. Zeng, Y. Zhao, K. Ou, and W. Song, “Research on cloud storage architecture and key technologies,” ACM, 2009, pp. 1044-1048.

J. Rittinghouse, Cloud Computing: Implementation, Management, and Security, CRC, 2009.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” 2009.

K. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: Theory and implementation,” Available from ePrint, report2008.

B. Dlg Filho, “PSLM: Demonstrating data possession and uncheatable data transfer,” Book PSLM: Demonstrating data possession and uncheatable data transfer, Series PSLM: Demonstrating data possession and uncheatable data transfer, ed., Editor Cryptology ePrint Archive, Report 2006/150, 2006, pp.

T.S.J. Schwarz, and E.L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” 2006, pp. 12-12.

H. Mouratidis, P. Giorgini, and G. Manson, “Modelling secure multiUSER systems,” ACM, 2003, pp. 866.


  • There are currently no refbacks.