CFP last date
20 December 2024
Reseach Article

High Performance AAA Security for Cloud Computing in Hierarchical Model

by Nisha Bawaria, Kamlesh Namdeo, Pankaj Richhariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 15
Year of Publication: 2015
Authors: Nisha Bawaria, Kamlesh Namdeo, Pankaj Richhariya
10.5120/ijca2015907634

Nisha Bawaria, Kamlesh Namdeo, Pankaj Richhariya . High Performance AAA Security for Cloud Computing in Hierarchical Model. International Journal of Computer Applications. 132, 15 ( December 2015), 47-50. DOI=10.5120/ijca2015907634

@article{ 10.5120/ijca2015907634,
author = { Nisha Bawaria, Kamlesh Namdeo, Pankaj Richhariya },
title = { High Performance AAA Security for Cloud Computing in Hierarchical Model },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 15 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 47-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number15/23694-2015907634/ },
doi = { 10.5120/ijca2015907634 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:33.082016+05:30
%A Nisha Bawaria
%A Kamlesh Namdeo
%A Pankaj Richhariya
%T High Performance AAA Security for Cloud Computing in Hierarchical Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 15
%P 47-50
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In internet and text documents tons of vital information is available. This side-information is available in documents as beginning information, the links within the documents, user-access behavior from internet logs, or different non-textual characteristics which are embedded into the text document. This side information is employed in document clustering of such documents bunch. This information can embody noisy information as well; therefore it's tough to use it with efficiency. Thus correct algorithms are needed to use such information in document clustering to avoid noise from the extracted clusters. We'd like a properly dominated ways to perform the mining method to optimize the benefits got from mistreatment of this side information. In this work, we are improving the planning of AAA algorithm to accommodate high security and efficiency of the system.

References
  1. Sah, S.K.; Shakya, S.; Dhungana, H., "A security management for Cloud based applications and services with Diameter-AAA," Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on , vol., no., pp.6,11, 7-8 Feb. 2014 doi: 10.1109/ICICICT.2014.6781243
  2. Sinha, N.; Khreisat, L., "Cloud computing security, data, and performance issues," Wireless and Optical Communication Conference (WOCC), 2014 23rd , vol., no., pp.1,6, 9-10 May 2014 doi: 10.1109/WOCC.2014.6839924
  3. Dinadayalan, P.; Jegadeeswari, S.; Gnanambigai, D., "Data Security Issues in Cloud Environment and Solutions," Computing and Communication Technologies (WCCCT), 2014 World Congress on , vol., no., pp.88,91, Feb. 27 2014-March 1 2014 doi: 10.1109/WCCCT.2014.63
  4. Bohli, J.-M.; Gruschka, N.; Jensen, M.; Iacono, L.L.; Marnau, N., "Security and Privacy-Enhancing Multicloud Architectures," Dependable and Secure Computing, IEEE Transactions on , vol.10, no.4, pp.212,224, July-Aug. 2013 doi: 10.1109/TDSC.2013.6
  5. Datta, E.; Goyal, N., "Security attack mitigation framework for the cloud," Reliability and Maintainability Symposium (RAMS), 2014 Annual , vol., no., pp.1,6, 27-30 Jan. 2014 doi: 10.1109/RAMS.2014.6798457
  6. Peter Mell and Tim Grance, "Effectively and Securely Using the Cloud Computing Paradigm",National Institute of Standards and Technology (NIST) Information Technology Laboratory, October, 2009.
  7. P. B. Maxine Singer, Genes & Genomes: a Changing Per-spective. University Science Books, Mill Valley, CA, 1991.
  8. Raj Kumar Buyya, James Broberg and Andrzej Goscinski, "Cloud Computing Principles and Paradigms", A JOHN WILEY & SONS, INC., PUBLICATION 2011.
  9. P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, "Diameter Base Protocol," RFC 3588 (Proposed Standard), Sep. 2003.
  10. D. Sun, P. McCann, H. Tschofenig, T. Tsou, "Diameter Quality-ofService Application" , Internet Engineering Task Force (IETF), May 2010.
  11. Balachandra Reddy Kandukuri , Ramakrishna Paturi V, Dr. Atanu, "Cloud Security Issues", 2009 IEEE International Conference on Services Computing.
  12. Security Guidance for Critical Areas of Focus in Cloud Computing, release on March 20 I O. DOl http://www.cloudsecurityalliance.org/topthreats/csathreats.v I .0. pdf
  13. H. Hakala, L. Mattila, J.-P. Koskinen, M. Stura, and J. Loughney, "Diameter Credit-Control Application," RFC 4006 (Proposed Standard), Aug. 2005.
  14. P. Jaeger, et aI., "Cloud Computing and Information Policy: Computing in a Policy Cloud?" Journal ofinformation Technology & Politics, vol. 5(3), pp. 269-283, 2008.
  15. H. Lim, et aI., "Automated Control in Cloud Computing: Challenges and Opportunities," in Proceedings of the First workshop on Automate Control for Datacenters and Clouds (ACDC '09), 2009, pp. 13-18.
  16. L. Youseff, M. Butrico, and D. Da Silva, "Toward a unified ontology of cloud computing," in Grid Computing Environ-ments Workshop, GCE'08, 2008.
  17. C. Weinhardt, A. Anandasivam, B. Blau, N. Borissov, and et aI., "Cloud computing a classification, business models, and research directions," vol. I, no. 5, pp. 391-399, 2009
Index Terms

Computer Science
Information Sciences

Keywords

AAA Algorithm Security Cloud Computing Hierarchical Model