PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION
Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2017-01-01
|
Series: | ICTACT Journal on Soft Computing |
Subjects: | |
Online Access: | http://ictactjournals.in/ArticleDetails.aspx?id=2824 |
id |
doaj-1b22f3068df6460a90a4e1d8c56b2171 |
---|---|
record_format |
Article |
spelling |
doaj-1b22f3068df6460a90a4e1d8c56b21712020-11-25T02:19:16ZengICT Academy of Tamil NaduICTACT Journal on Soft Computing0976-65612229-69562017-01-017214021407PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATIONR. Poorvadevi0Rajalakshmi1Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, IndiaSri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, IndiaCloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.http://ictactjournals.in/ArticleDetails.aspx?id=2824Cloud VendorFuzzy Data ArrayCloud ServerData CentreCloud Service ProviderCloudsimSignature Evaluator |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
R. Poorvadevi Rajalakshmi |
spellingShingle |
R. Poorvadevi Rajalakshmi PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION ICTACT Journal on Soft Computing Cloud Vendor Fuzzy Data Array Cloud Server Data Centre Cloud Service Provider Cloudsim Signature Evaluator |
author_facet |
R. Poorvadevi Rajalakshmi |
author_sort |
R. Poorvadevi |
title |
PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION |
title_short |
PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION |
title_full |
PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION |
title_fullStr |
PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION |
title_full_unstemmed |
PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION |
title_sort |
preventive signature model for secure cloud deployment through fuzzy data array computation |
publisher |
ICT Academy of Tamil Nadu |
series |
ICTACT Journal on Soft Computing |
issn |
0976-6561 2229-6956 |
publishDate |
2017-01-01 |
description |
Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner. |
topic |
Cloud Vendor Fuzzy Data Array Cloud Server Data Centre Cloud Service Provider Cloudsim Signature Evaluator |
url |
http://ictactjournals.in/ArticleDetails.aspx?id=2824 |
work_keys_str_mv |
AT rpoorvadevi preventivesignaturemodelforsecureclouddeploymentthroughfuzzydataarraycomputation AT rajalakshmi preventivesignaturemodelforsecureclouddeploymentthroughfuzzydataarraycomputation |
_version_ |
1724877184318832640 |