Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Preventive Signature Model for Secure Cloud Deployment through Fuzzy Data Array Computation


Affiliations
1 Department of Computer Science and Engineering, Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, India
     

   Subscribe/Renew Journal


Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer's data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

Keywords

Cloud Vendor, Fuzzy Data Array, Cloud Server, Data Centre, Cloud Service Provider, Cloudsim, Signature Evaluator.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Tram Truong-Huu and Chen-Khong Tham, “A Novel Model for Competition and Cooperation among Cloud Providers”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 251-265, 2014.
  • Alain Tchana, et al., “A Self-Scalable and Auto Regulated request Injection Benchmarking Tool for Automatic Saturation Detection”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 279-291, 2014.
  • Luis Tomas and Johan Tordsson, “An Automatic Approach to Risk-Aware Data Center Overbooking”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 292-305, 2014.
  • Yang Wang and Wei Shi, “Budget-Driven Scheduling Algorithms for batches of Map Reduce Jobs in Heterogeneous Clouds”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 306-319, 2014.
  • Bei Guan, Yanjun Wu, Liping Ding and Yongji Wang, “CIV Scheduled Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VM’s”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, 2014
  • Shanjiang Tang, Bu-Sung Lee and Bingsheng He; “Dynamic MR: A Dynamic Slot Allocation Optimization Framework for Map Reduce Clusters”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 333-347, 2014.
  • B. Poornima and T. Rajendran, “Improving Cloud Security by Enhanced Hasbe using Hybrid Encryption Scheme”, Proceedings of World Congress on Computing and Communication Technologies, pp. 312-314, 2014.
  • Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang, Chi Yang, Rajiv Ranjan and Ramamohanarao Kotagiri, “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates Parallel and Distributed Systems”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 9, pp. 2234-2244, 2014.

Abstract Views: 169

PDF Views: 3




  • Preventive Signature Model for Secure Cloud Deployment through Fuzzy Data Array Computation

Abstract Views: 169  |  PDF Views: 3

Authors

R. Poorvadevi
Department of Computer Science and Engineering, Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, India
S. Rajalakshmi
Department of Computer Science and Engineering, Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, India

Abstract


Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer's data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

Keywords


Cloud Vendor, Fuzzy Data Array, Cloud Server, Data Centre, Cloud Service Provider, Cloudsim, Signature Evaluator.

References