An Efficient Security Model in Cloud Computing based on Soft computing Techniques
نویسندگان
چکیده
منابع مشابه
An Efficient Security Model in Cloud Computing based on Soft computing Techniques
In recent years, Cloud computing is one of the most attractive technological research area because of its flexibility as well as cost efficiency. Generally in a cloud the data are transferred among the client and the server. While the transferring of the data takes place, security becomes the major concern. Efficient security system must be employed in a cloud inorder to make the computing envi...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملAn Efficient Model for Providing Security in Cloud Computing Environment
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today’s approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important o...
متن کاملAn Efficient Model for Providing Security in Cloud computing Environment
All rights reserved by www.ijsrd.com 2593 Abstract--In this paper, we present a hybrid model for providing security in cloud computing environment. This model combines the advantages of two most popular existing cloud security models. The first model is hierarchical model and the other one is third party auditor based model. In this paper, we present an overview of existing cloud security algor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/9760-3219