• TRUSTED AND MUTUAL MANAGER BASED APPROACH FOR CLOUD SECURITY

Jitendra Singh Rajawat*, Sanjay Gaur

Abstract


Cloud computing is the next immense mania after internet in the field of information technology. We can say that it is now running as metaphor for internet. Cloud computing is internet based computing technology where software, shared resources and information are provided to consumers or devices on-demand. Cloud is just a huge storage for ready on service of software and support services. It consist of giant database of software and software services. But the major problem associated with cloud is security measures. The traditional security measures are now not enough for that purpose. This study tries to give a secure model or algorithm for securing cloud during transaction of software and support services. The proposed framework clearly describes the objectives of algorithm and their utility in present scenario where cloud is going to be synonyms of internet.


Keywords


Trusted, Security, Authentication, Encryption, Algorithm, Server.

Full Text:

PDF


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
© 2010-2022 International Journal of Mathematical Archive (IJMA)
Copyright Agreement & Authorship Responsibility
Web Counter
https://journals.zetech.ac.ke/scatter-hitam/https://silasa.sarolangunkab.go.id/swal/https://sipirus.sukabumikab.go.id/storage/uploads/-/sthai/https://sipirus.sukabumikab.go.id/storage/uploads/-/stoto/https://alwasilahlilhasanah.ac.id/starlight-princess-1000/https://www.remap.ugto.mx/pages/slot-luar-negeri-winrate-tertinggi/https://waper.serdangbedagaikab.go.id/storage/sgacor/https://waper.serdangbedagaikab.go.id/public/images/qrcode/slot-dana/https://siipbang.katingankab.go.id/storage_old/maxwin/https://waper.serdangbedagaikab.go.id/public/img/cover/10k/https://waper.serdangbedagaikab.go.id/storage/app/https://waper.serdangbedagaikab.go.id/storage/idn/