Open Access
Subscription Access
Open Access
Subscription Access
Preventive Signature Model for Secure Cloud Deployment through Fuzzy Data Array Computation
Subscribe/Renew Journal
Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer's data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.
Keywords
Cloud Vendor, Fuzzy Data Array, Cloud Server, Data Centre, Cloud Service Provider, Cloudsim, Signature Evaluator.
Subscription
Login to verify subscription
User
Font Size
Information
- Tram Truong-Huu and Chen-Khong Tham, “A Novel Model for Competition and Cooperation among Cloud Providers”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 251-265, 2014.
- Alain Tchana, et al., “A Self-Scalable and Auto Regulated request Injection Benchmarking Tool for Automatic Saturation Detection”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 279-291, 2014.
- Luis Tomas and Johan Tordsson, “An Automatic Approach to Risk-Aware Data Center Overbooking”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 292-305, 2014.
- Yang Wang and Wei Shi, “Budget-Driven Scheduling Algorithms for batches of Map Reduce Jobs in Heterogeneous Clouds”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 306-319, 2014.
- Bei Guan, Yanjun Wu, Liping Ding and Yongji Wang, “CIV Scheduled Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VM’s”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, 2014
- Shanjiang Tang, Bu-Sung Lee and Bingsheng He; “Dynamic MR: A Dynamic Slot Allocation Optimization Framework for Map Reduce Clusters”, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp. 333-347, 2014.
- B. Poornima and T. Rajendran, “Improving Cloud Security by Enhanced Hasbe using Hybrid Encryption Scheme”, Proceedings of World Congress on Computing and Communication Technologies, pp. 312-314, 2014.
- Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang, Chi Yang, Rajiv Ranjan and Ramamohanarao Kotagiri, “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates Parallel and Distributed Systems”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 9, pp. 2234-2244, 2014.
Abstract Views: 244
PDF Views: 3