Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
An Comparison with Property Based Resource Attestation to Secure Cloud Environment

An Comparison with Property Based Resource Attestation to Secure Cloud Environment

Ratings: (0)|Views: 12 |Likes:
Published by Open Research
Abstract:
In this paper we propose a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment. Our approach is mainly divided into two parts. First part is controlled by the normal user which gets permission by the cloud environment for performing operation and for loading data. Second part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the data then it take permission from the client environment. This provides a way to hide the data and normal user can protect their data from the cloud provider. This provides a two way security which helps both the cloud and the normal user. For the above concept we propose a java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one.
Abstract:
In this paper we propose a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment. Our approach is mainly divided into two parts. First part is controlled by the normal user which gets permission by the cloud environment for performing operation and for loading data. Second part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the data then it take permission from the client environment. This provides a way to hide the data and normal user can protect their data from the cloud provider. This provides a two way security which helps both the cloud and the normal user. For the above concept we propose a java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one.

More info:

Published by: Open Research on May 25, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/25/2012

pdf

text

original

You're Reading a Free Preview
Pages 2 to 12 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->