期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2012
卷号:3
期号:4
页码:4658-4661
出版社:TechScience Publications
摘要:Now a day’s cloud computing is one of the emerging Technologies. This created a new era in the IT Industry With its Service Oriented Architecture [1] .As the services of Organization Increases manganese of these services also becoming one of the problems. Management of resources will create some of security issues which will question the quality of service. Intrusions are one of the main security problems in cloud resource centers. Cloud resource administrators are facing a lot of problems in tracing out the anomalous and instructors. This paper explains how to overcome this problem. Here we are given some levels of security for cloud centers, when the level increasing the security levels also increases. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the two main issues that we address in context of such response policies are that of policy matching, and policy administration. The identification of misbehaving server(s). Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Intrusions, malicious data modification attack. Implementation of Trusted pools also one of the postulated solutions for the cloud environment
关键词:Cloud Computing [2]; Security; Policy;Administrations; Trusted Pool. Rivest; Shamir and Adleman;(RSA); Public Key Infrastructure (PKI).