A Study of Investigation Analysis of Safety and Transparency Clearness in Cloud Computing Application

Vol-4 | Issue-03 | March 2019 | Published Online: 13 March 2019    PDF ( 217 KB )
Author(s)
Rajesh Dawar 1

1Assistant Professor, Govt. College Barota, Gohana, Sonipat

Abstract

The cloud is an environment where different resources are combined and different services are offered to access resources. The high cost resources in the cloud environment are generally deployed and the cloud services provider provides a number of services to access the resources. In such loosely connected environments, the service provider knows nothing of the end user and it is difficult to restrict access and more likely to attack. The resources in the cloud can be accessed by external users who registered in the cloud environment. Initially, a service orientation approach method was proposed which restricts user access in various ways, and uses data encryption multitask to form an intrusion detection system against various threats in a secure cloud environment. The user application is approximated on the basis of the service needed and the application is approximated in many ways using certain variables such as access frequency and user profile, organizational role and more. Any cloud user who registers would use different tunings to access the cloud service. The cloud user should not have access to the service at any given time. The user must follow the provisions of the service provider whenever the user uses the cloud services. The identity verification and the user's secret key are explicitly provided. But every user's morality and sincerity can be analyzed by monitoring user details implicitly. The cloud environment would be aided by monitoring the user's activity to access the service without knowing the user. Access to intrusion detection can identify, some methods are available and different features can be used. These methods keep the list of user logs that were previously identified as malicious. The malicious request is determined and the request is denied based on the log available. Unidentified malicious is not the problem with this strategy. Individual nodes also use multiple identities, which jeopardize the detection scheme. Furthermore, based on entropy measurement, the method calculates entropy value for the received packages.

Keywords
Safety, Transparency, Cloud Computing Application, cloud environment, application
Statistics
Article View: 284