Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Strengthening the Process of User Legitimacy in Cloud Environment Using Fuzzification Approach


Affiliations
1 CSE Department, SCSVMV University, Kanchipuram, Tamil Nadu, India
2 SCSVMV University, Enathur, Kanchipuram, Tamil Nadu, India
     

   Subscribe/Renew Journal


In cloud computing lots of resources are consumed by the distinct end users whoever are strongly connected with the web. CSP is providing enormous amount of services to its requested clients. However service provider is offering plenty of services, still there is a lack in security and privacy factors at the client end. Whatever transaction and operations are performed by the cloud users those are safely maintained on the cloud database. Once the resources/services are transferred from CSP to the customer's location at that instance, hackers get the loophole from the customers based on the way they use the service. So, securing the user data is the essential task in the cloud service access platform. So, this proposed work is mainly used to authenticate cloud users and also protect the client data from the attackers as well as restricting the attacker's entry in the cloud environment. This can be achieved by using the fuzzy computational process, that is called fuzzification process to find the security solution which is optimal to the user focal point. The targeted result can be processed on the cloud apache stack tools.

Keywords

Cloud Vendor, Fuzzy Computations, Fuzzification, Cloud Service Provider, Cloud Clients, Authenticity.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 260

PDF Views: 2




  • Strengthening the Process of User Legitimacy in Cloud Environment Using Fuzzification Approach

Abstract Views: 260  |  PDF Views: 2

Authors

R. Poorvadevi
CSE Department, SCSVMV University, Kanchipuram, Tamil Nadu, India
S. Rajalakshmi
SCSVMV University, Enathur, Kanchipuram, Tamil Nadu, India

Abstract


In cloud computing lots of resources are consumed by the distinct end users whoever are strongly connected with the web. CSP is providing enormous amount of services to its requested clients. However service provider is offering plenty of services, still there is a lack in security and privacy factors at the client end. Whatever transaction and operations are performed by the cloud users those are safely maintained on the cloud database. Once the resources/services are transferred from CSP to the customer's location at that instance, hackers get the loophole from the customers based on the way they use the service. So, securing the user data is the essential task in the cloud service access platform. So, this proposed work is mainly used to authenticate cloud users and also protect the client data from the attackers as well as restricting the attacker's entry in the cloud environment. This can be achieved by using the fuzzy computational process, that is called fuzzification process to find the security solution which is optimal to the user focal point. The targeted result can be processed on the cloud apache stack tools.

Keywords


Cloud Vendor, Fuzzy Computations, Fuzzification, Cloud Service Provider, Cloud Clients, Authenticity.