Cloud

Secure Resource Management and Efficient Mining in Cloud Computing

Download Now Free registration required

Executive Summary

Cloud computing provide a large scale computing resources to various customers and developers. The resource transformation between customers and cloud maintenance can be easily threatened by the various cyber attacks, because cloud computing provide the service to many customers who are not proven to be trustworthy. Therefore cloud computing system needs to provide some fair and secure resource exchanges between customers. Hence a proposed frequent pattern matching resource protocol allows the cloud service provider to identify the duplication and exchange the resource to an agreed service over the internet in a fair way. Based on signature authentication and Frequent record set matching with the frequently used resource identification technique provide an efficient resource management system in Cloud Computing.

  • Format: PDF
  • Size: 522.84 KB