Open Access
Subscription Access
Open Access
Subscription Access
An Advanced Mechanism of Cloud Resource Security Process in Client Location by Using Soft Computing Approach
Subscribe/Renew Journal
Cloud computing is providing the distinct set of services by the form of cloud resources to the client end location. It needs to be iterated and operated on the secured cloud platform. It will increase the lots of security controls, function elements to be protected in the in the cloud client end. Though numerous security procedures, components, data security options are exist, but still we need to improve the cloud resources. Whenever the clients will perform some set of cloud service transactions, it is mandatory to secure the login, security, attribute credentials for the concern users. It will be evaluated on the cloud user service access platform and also it increases the security rate of cloud services. The proposed approach will be the betterment of cloud service operations and the securing aspect of cloud service components in an effective way by making use of soft computing applications. Fuzzy based operational sequences, authentication techniques are adopted in the cloud security process.
Keywords
Cloud Vendor, Fuzzy Technique, Cloud Server, Cloud Clients, Cloud Service Provider, Data Centre.
Subscription
Login to verify subscription
User
Font Size
Information
- T. Truong-Huu, “A novel model for competition and cooperation among cloud providers,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 251-265, 2014.
- A. Tchana, B. Dilenseger, N. De palma, J. Salmi, and A. Harbaoui, “A self-scalable and auto regulated request injection benchmarking tool for automatic saturation detection,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 279-291, 2014.
- L. Toma’s, and J. Tordsson, “An automatic approach to risk-aware data center overbooking,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 2014.
- Y. Wang, and W. Shi, “Budget-driven scheduling algorithms for batches of map reduce jobs in heterogeneous clouds,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 306-319, 2014.
- B. Guan, J. Wu, Y. Wang, and S. U. Khan, “CIV scheduled communication-aware inter-VM scheduling technique for decreased network latency between co-located VM’s,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 2014.
- S. Tang, B. Lee, and B. He, “Dynamic MR: A dynamic slot allocation optimization framework for Map reduce clusters” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 2014.
- K. Konstanteli, T. Cucinotta, K. A. Psyches’, and T. Varvarigou, “Elastic admission control for federated cloud services,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 348-361, July, 2014.
- S. Kailasam, P. Dhawalia, S. J. Balaji, G. Iyer, and J. Dharanipragada, “Extending Map-reduce across clouds with B-stream,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, 362-376, July, 2014.
- S. Di, C. L. Wang, and F. Cappello, “Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors,” IEEE Transactions on Cloud Computing, vol. 2, no. 2, April-June, 2014.
- S. Misra, S. Das, M. Khatua, S, and M. S. Obaidat, “Qos-guaranteed bandwidth shifting and redistribution in mobile cloud environment,” IEEE Transactions on Cloud Computing, vol. 2, no. 2, April-June, 2014.
- A. V. Dastjerdi, and R. Buyya, “Compatibility-Aware cloud service composition under fuzzy preferences of users,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, January-March, 2014.
- H. Morshedlou, and M. R. Meybodi, “Decreasing impact of SLA violations: A proactive resource allocation approach for cloud computing environments,” IEEE Transactions on Cloud Computing, vol. 2, no. 2, April-June, 2014.
Abstract Views: 383
PDF Views: 4