PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION

Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client...

Full description

Bibliographic Details
Main Authors: R. Poorvadevi, Rajalakshmi
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2017-01-01
Series:ICTACT Journal on Soft Computing
Subjects:
Online Access:http://ictactjournals.in/ArticleDetails.aspx?id=2824
id doaj-1b22f3068df6460a90a4e1d8c56b2171
record_format Article
spelling doaj-1b22f3068df6460a90a4e1d8c56b21712020-11-25T02:19:16ZengICT Academy of Tamil NaduICTACT Journal on Soft Computing0976-65612229-69562017-01-017214021407PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATIONR. Poorvadevi0Rajalakshmi1Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, IndiaSri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, IndiaCloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.http://ictactjournals.in/ArticleDetails.aspx?id=2824Cloud VendorFuzzy Data ArrayCloud ServerData CentreCloud Service ProviderCloudsimSignature Evaluator
collection DOAJ
language English
format Article
sources DOAJ
author R. Poorvadevi
Rajalakshmi
spellingShingle R. Poorvadevi
Rajalakshmi
PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION
ICTACT Journal on Soft Computing
Cloud Vendor
Fuzzy Data Array
Cloud Server
Data Centre
Cloud Service Provider
Cloudsim
Signature Evaluator
author_facet R. Poorvadevi
Rajalakshmi
author_sort R. Poorvadevi
title PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION
title_short PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION
title_full PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION
title_fullStr PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION
title_full_unstemmed PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION
title_sort preventive signature model for secure cloud deployment through fuzzy data array computation
publisher ICT Academy of Tamil Nadu
series ICTACT Journal on Soft Computing
issn 0976-6561
2229-6956
publishDate 2017-01-01
description Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.
topic Cloud Vendor
Fuzzy Data Array
Cloud Server
Data Centre
Cloud Service Provider
Cloudsim
Signature Evaluator
url http://ictactjournals.in/ArticleDetails.aspx?id=2824
work_keys_str_mv AT rpoorvadevi preventivesignaturemodelforsecureclouddeploymentthroughfuzzydataarraycomputation
AT rajalakshmi preventivesignaturemodelforsecureclouddeploymentthroughfuzzydataarraycomputation
_version_ 1724877184318832640