Open Access
Subscription Access
Open Access
Subscription Access
Strengthening the Process of User Legitimacy in Cloud Environment Using Fuzzification Approach
Subscribe/Renew Journal
In cloud computing lots of resources are consumed by the distinct end users whoever are strongly connected with the web. CSP is providing enormous amount of services to its requested clients. However service provider is offering plenty of services, still there is a lack in security and privacy factors at the client end. Whatever transaction and operations are performed by the cloud users those are safely maintained on the cloud database. Once the resources/services are transferred from CSP to the customer's location at that instance, hackers get the loophole from the customers based on the way they use the service. So, securing the user data is the essential task in the cloud service access platform. So, this proposed work is mainly used to authenticate cloud users and also protect the client data from the attackers as well as restricting the attacker's entry in the cloud environment. This can be achieved by using the fuzzy computational process, that is called fuzzification process to find the security solution which is optimal to the user focal point. The targeted result can be processed on the cloud apache stack tools.
Keywords
Cloud Vendor, Fuzzy Computations, Fuzzification, Cloud Service Provider, Cloud Clients, Authenticity.
Subscription
Login to verify subscription
User
Font Size
Information
Abstract Views: 260
PDF Views: 2