CFP last date
20 January 2025
Reseach Article

Secure Resource Management and Efficient Mining in Cloud Computing

by S. Ramamoorthy, S. Rajalakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 9
Year of Publication: 2013
Authors: S. Ramamoorthy, S. Rajalakshmi
10.5120/11868-7661

S. Ramamoorthy, S. Rajalakshmi . Secure Resource Management and Efficient Mining in Cloud Computing. International Journal of Computer Applications. 69, 9 ( May 2013), 4-8. DOI=10.5120/11868-7661

@article{ 10.5120/11868-7661,
author = { S. Ramamoorthy, S. Rajalakshmi },
title = { Secure Resource Management and Efficient Mining in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 9 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number9/11868-7661/ },
doi = { 10.5120/11868-7661 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:29:46.425315+05:30
%A S. Ramamoorthy
%A S. Rajalakshmi
%T Secure Resource Management and Efficient Mining in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 9
%P 4-8
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provide a large scale computing resources to various customers and developers. The resource transformation between customers and cloud maintenance can be easily threatened by the various cyber attacks, because cloud computing provide the service to many customers who are not proven to be trustworthy. Therefore cloud computing system needs to provide some fair and secure resource exchanges between customers. Hence a proposed frequent pattern matching resource protocol allows the cloud service provider to identify the duplication and exchange the resource to an agreed service over the internet in a fair way. Based on signature authentication and Frequent record set matching with the frequently used resource identification technique provide an efficient resource management system in Cloud Computing

References
  1. M. Armbrust,A. Fox,R. Griffith,A. D. J oseph,R. H. Katz, A. Konwinski, G. Lee, D.
  2. Amazon Web Services, Online at http://aws. amason. com.
  3. Google App Engine, On line at http://code. google. com/appengine/.
  4. Microsoft Azure,Online.
  5. Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing", IEEE INFOCOM 2010 proceedings.
  6. M. R. Tribhuwan, V. A. Bhuyar, Shabana Pirzade, "Ensuring Data Storage Security in Cloud Computing through Two-way Handshake based on Token Management", IEEE ARTCom 2010
  7. Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", ESORICS 2009
  8. Cong Wang, Qian Wang, Kui Ren, Wenjing Lou,"Ensuring Data Storage Security in Cloud Co mputing", IEEE, IWQoS. 17th International 2009.
  9. Lifei Wei, Haojin Zhu, Zhenfu Cao, Weiwei Jia, thanasios V. Vasilakos, "SecCloud: Bridging Secure Storage and Computation in Cloud", IEEEICDCSW,2010
Index Terms

Computer Science
Information Sciences

Keywords

cloud computing signature authentication hash function frequent pattern record set matching data storage security