Securing Resource Location with the Help of Phoenix Coordinate System and Host Authentication in Cloud Environment

Download Now
Provided by: International Journal of Computer Science and Communication Networks (IJCSCN)
Topic: Cloud
Format: PDF
Cloud computing may be defined as a set of IT services that are provided to a client over a network with the ability to scale up or down their service requirements. Usually cloud services are delivered by a service provider who owns the infrastructure and provide services on pay and use basis. In this paper, the authors will represent an approach to increase accuracy of virtual coordinate for secure allocation of resources in cloud environment. Also in this paper, they have proposed a system through which they can overcome coordinate pollution attacks so to make resource locality easy and effective.
Download Now

Find By Topic