International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 60 - Number 14 |
Year of Publication: 2012 |
Authors: Vijay.g.r, A. Rama Mohan Reddy |
10.5120/9760-3219 |
Vijay.g.r, A. Rama Mohan Reddy . An Efficient Security Model in Cloud Computing based on Soft computing Techniques. International Journal of Computer Applications. 60, 14 ( December 2012), 18-23. DOI=10.5120/9760-3219
In recent years, Cloud computing is one of the most attractive technological research area because of its flexibility as well as cost efficiency. Generally in a cloud the data are transferred among the client and the server. While the transferring of the data takes place, security becomes the major concern. Efficient security system must be employed in a cloud inorder to make the computing environment secure from unauthenticated users. Due to this reason, cloud securities have emerged as the recent discussion in the IT sector. Various techniques have been formulated inorder to make the cloud computing environment secure. In this paper, we presented an efficient security model in cloud computing environment with the help of Soft Computing Techniques. Here, a strong security in cloud computing is managed with the help of reputation management system to ensure the data security. Also maintaining the transaction table that contains the information related to the previous transactions like the previous transaction id of the cloud node involved, timestamp, public keys of the cloud involved, trust evaluation etc, can be very helpful to identify the relevant cloud nodes suitable of data transmission. Soft Computing Techniques utilizes fuzzy logic, neural network or genetic algorithm for processing. In the proposed method, we utilized genetic algorithm as the computing technique to identify the suitable nodes for transmission.