An Algorithm for Implementing Security in Cloud

Download Now
Provided by: International Journal of Innovative Science Engineering and Technology (IJISET)
Topic: Security
Format: PDF
Cloud computing provides elastically provisioned computing, software, and service infrastructure. This elasticity allows users to outsource their computing infrastructure, growing or shrinking it as necessary. To make use of this cloud computing as a platform for security-sensitive applications like electronic transaction processing systems the authors incorporate trust based security. The electronic transaction processing system needs high quality of security to guarantee authentication, integrity, and confidentiality of information. In this paper, they are introducing the factor trust level which is measured dynamically using differential equations for each host in the cloud.
Download Now

Find By Topic