Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Advanced Mechanism of Cloud Resource Security Process in Client Location by Using Soft Computing Approach


Affiliations
1 SCSVMV University, Kanchipuram, Tamil Nadu, India
     

   Subscribe/Renew Journal


Cloud computing is providing the distinct set of services by the form of cloud resources to the client end location. It needs to be iterated and operated on the secured cloud platform. It will increase the lots of security controls, function elements to be protected in the in the cloud client end. Though numerous security procedures, components, data security options are exist, but still we need to improve the cloud resources. Whenever the clients will perform some set of cloud service transactions, it is mandatory to secure the login, security, attribute credentials for the concern users. It will be evaluated on the cloud user service access platform and also it increases the security rate of cloud services. The proposed approach will be the betterment of cloud service operations and the securing aspect of cloud service components in an effective way by making use of soft computing applications. Fuzzy based operational sequences, authentication techniques are adopted in the cloud security process.

Keywords

Cloud Vendor, Fuzzy Technique, Cloud Server, Cloud Clients, Cloud Service Provider, Data Centre.
Subscription Login to verify subscription
User
Notifications
Font Size


  • T. Truong-Huu, “A novel model for competition and cooperation among cloud providers,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 251-265, 2014.
  • A. Tchana, B. Dilenseger, N. De palma, J. Salmi, and A. Harbaoui, “A self-scalable and auto regulated request injection benchmarking tool for automatic saturation detection,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 279-291, 2014.
  • L. Toma’s, and J. Tordsson, “An automatic approach to risk-aware data center overbooking,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 2014.
  • Y. Wang, and W. Shi, “Budget-driven scheduling algorithms for batches of map reduce jobs in heterogeneous clouds,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 306-319, 2014.
  • B. Guan, J. Wu, Y. Wang, and S. U. Khan, “CIV scheduled communication-aware inter-VM scheduling technique for decreased network latency between co-located VM’s,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 2014.
  • S. Tang, B. Lee, and B. He, “Dynamic MR: A dynamic slot allocation optimization framework for Map reduce clusters” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 2014.
  • K. Konstanteli, T. Cucinotta, K. A. Psyches’, and T. Varvarigou, “Elastic admission control for federated cloud services,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 348-361, July, 2014.
  • S. Kailasam, P. Dhawalia, S. J. Balaji, G. Iyer, and J. Dharanipragada, “Extending Map-reduce across clouds with B-stream,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 362-376, July, 2014.
  • S. Di, C. L. Wang, and F. Cappello, “Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors,” IEEE Transactions on Cloud Computing, vol. 2, no. 2, April-June, 2014.
  • S. Misra, S. Das, M. Khatua, S, and M. S. Obaidat, “Qos-guaranteed bandwidth shifting and redistribution in mobile cloud environment,” IEEE Transactions on Cloud Computing, vol. 2, no. 2, April-June, 2014.
  • A. V. Dastjerdi, and R. Buyya, “Compatibility-Aware cloud service composition under fuzzy preferences of users,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, January-March, 2014.
  • H. Morshedlou, and M. R. Meybodi, “Decreasing impact of SLA violations: A proactive resource allocation approach for cloud computing environments,” IEEE Transactions on Cloud Computing, vol. 2, no. 2, April-June, 2014.

Abstract Views: 398

PDF Views: 4




  • An Advanced Mechanism of Cloud Resource Security Process in Client Location by Using Soft Computing Approach

Abstract Views: 398  |  PDF Views: 4

Authors

R. Poorvadevi
SCSVMV University, Kanchipuram, Tamil Nadu, India
S. Rajalakshmi
SCSVMV University, Kanchipuram, Tamil Nadu, India

Abstract


Cloud computing is providing the distinct set of services by the form of cloud resources to the client end location. It needs to be iterated and operated on the secured cloud platform. It will increase the lots of security controls, function elements to be protected in the in the cloud client end. Though numerous security procedures, components, data security options are exist, but still we need to improve the cloud resources. Whenever the clients will perform some set of cloud service transactions, it is mandatory to secure the login, security, attribute credentials for the concern users. It will be evaluated on the cloud user service access platform and also it increases the security rate of cloud services. The proposed approach will be the betterment of cloud service operations and the securing aspect of cloud service components in an effective way by making use of soft computing applications. Fuzzy based operational sequences, authentication techniques are adopted in the cloud security process.

Keywords


Cloud Vendor, Fuzzy Technique, Cloud Server, Cloud Clients, Cloud Service Provider, Data Centre.

References