期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2016
卷号:7
期号:2
页码:864-870
出版社:TechScience Publications
摘要:Cloud computing is the latest trend in computing bywhich various services, applications and other computingthings can be delivered as a service. Cloud computing is a newflexible approach for providing higher computational power inshared medium. It provides the distributed model basedon self evaluating techniques to improve the processingcapabilities of the system with lesser managerial concerns. It ismade up of client, application, platform, servers andinfrastructures.This computing model delivers computation capabilitiesas a calculated service from above components to end users.Though a wide variety of devices and their integration areconcerned, priority of handling security will go down. As theusers of cloud is increasing day by day, one need to handle thedata, system and confidentiality issues carefully.With this work[17], the aim is to make the applicationlevel of security provided by any of the servers or providemore effectively and according to the users need. For achievingthe confidentiality attribute based encryption is used. Digitalsignature and multi factor authentication like single sign onone (SSO) are some of their examples. They should bedelivered as a service so that multiple small scale companiesmight also integrate them to serve their users in a better way.Multiple authentication mechanisms, like digital signatures,certificates or 2-factor security and several identity validatorscan coexist and can be combined to suite the most complexneeds.So a new security model must be added along withexisting system to provide authenticated access of authorizeddata in a cloud environment. Also the type of users & theiraccessing medium is an outside world and due to that theunauthorized changes in the system may occur. We haveproposed an new security approach in [17] to increase the levelof security in cloud storage system. In this paper we trying toevaluate the proposed approach[17] on various parameters ofevaluation and its effect on the resource consumption of cloudinfrastructure.