Strengthening the Process of User Legitimacy in Cloud Environment Using Fuzzification Approach
Published: 2016
Author(s) Name: R. Poorvadevi, S. Rajalakshmi |
Author(s) Affiliation: SCSVMV University, Enathur, Kanchipuram, Tamil Nadu, India
Locked
Subscribed
Available for All
Abstract
In cloud computing lots of resources are consumed by the distinct end users whoever are strongly connected with the web. CSP is providing enormous amount of services to its requested clients. However service provider is offering plenty of services, still there is a
lack in security and privacy factors at the client end. Whatever transaction and operations are performed by the cloud users those are safely maintained on the cloud database. Once the resources/services are transferred from CSP to the customers location at that instance, hackers get the loophole from the customers based on the way they use the service. So, securing the user data is the essential task in the cloud service access platform. So, this proposed work is mainly used to authenticate cloud users and also protect the client data from the attackers as well as restricting the attackers entry in the cloud environment. This can be achieved by using the fuzzy computational process, that is called fuzzification process to find the security solution which is optimal to the user focal point. The targeted result can be processed on the cloud apache stack tools.
Keywords: Cloud Vendor, Fuzzy Computations, Fuzzification, Cloud Service Provider, Cloud Clients, Authenticity
View PDF