期刊名称:International Journal of Engineering and Computer Science
印刷版ISSN:2319-7242
出版年度:2015
卷号:4
期号:4
页码:11257-11266
出版社:IJECS
摘要:Cloud computing is a rising innovation and increase consideration in scholastic and business range. Assets are pooled andoffer with clients on interest. With a specific end goal to give better execution of cloud environment, undertaking planning is aparamount issue. The objective of the study to explore the different environments of the cloud infrastructure w.r.t security. It is bigchallenge for the cloud service provider company to implement the security and meeting the highest level of the service with theproviding quality service and secure environments to the clients. This is how the Cloud service providing companies build the trustrelationship with their clients. The propose model is the security optimization of the already implemented security in the cloudenvironments along with the quality service in terms of required bandwidth and required infrastructure like Saas, Paas, or Iaas.Meeting both, quality of service and security, Cloud service Provider Company has to do lot of working as the cloud has multipleintegrated infrastructures. It will be a big loop hole if a cloud service provider company give access to their actual servers or live IPs toprovide services to the clients. There will be lost of resources, time and availability of resources to the legitimate users. The primaryobjective of the study is to build a model which provides us un-authenticated and un-authorized users blocked from one single pointwhich is other than the service provider to the clients of Saas, Paas, or Iaas and the resources to authenticate and authorize a user within the cloud are used by the legitimate users