Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Approach for Secure Processing of Service Request with Security Manager in Cloud


Affiliations
1 Indus College of Engineering, India
2 Indus College of Engineering, Iceland
     

   Subscribe/Renew Journal


Cloud computing is globally connected computing resource in same point, which supports all types of resource for executing an application or software. It provides all its resource as services like software as service and also hardware as service in infrastructure service. The cloud is accessed by millions of user at a single point of time, since cloud is centralized service provider and all the request that is sent by the user has to be processed and it should respond to the user , where the security of the cloud also depends on processing the requests. Hence this paper comes with a novel approach to provide a secure processing of the user service request, with security manager which monitors the overall cloud environment for any intrusion by the outsider and also by the cloud users. This approach provides secure environment for both cloud user and also cloud service provider. It gives better response time and throughput for the cloud user and also security for the cloud resource and confidential data in cloud.


Keywords

Access Control List, Response Time, Secure Processing, SLA.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 327

PDF Views: 1




  • A Novel Approach for Secure Processing of Service Request with Security Manager in Cloud

Abstract Views: 327  |  PDF Views: 1

Authors

J. Vikram
Indus College of Engineering, India
S. Agilesh
Indus College of Engineering, India
V. Guhan
Indus College of Engineering, India
B. Manikandan
Indus College of Engineering, Iceland

Abstract


Cloud computing is globally connected computing resource in same point, which supports all types of resource for executing an application or software. It provides all its resource as services like software as service and also hardware as service in infrastructure service. The cloud is accessed by millions of user at a single point of time, since cloud is centralized service provider and all the request that is sent by the user has to be processed and it should respond to the user , where the security of the cloud also depends on processing the requests. Hence this paper comes with a novel approach to provide a secure processing of the user service request, with security manager which monitors the overall cloud environment for any intrusion by the outsider and also by the cloud users. This approach provides secure environment for both cloud user and also cloud service provider. It gives better response time and throughput for the cloud user and also security for the cloud resource and confidential data in cloud.


Keywords


Access Control List, Response Time, Secure Processing, SLA.