원문정보
초록
영어
The inference for this research was concentrated on client’s data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software’s and hardware’s are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client’s necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client’s info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.
목차
1. INTRODUCTION
2. COMPONENT OF CLOUD
2.1 Clients
2.2 Thick
2.3 Thin
2.4 Mobile
2.5 Distribute Server
2.6 Data Center
3. PREVIOUS WORK
4. METHODOLOGY
4.1 Access Control Model
5. ARCHITECTURE OF DEVELOPED ACCESS CONTROL MODEL FOR CLOUD
6. WORKFLOW MODEL FOR ACCESS CONTROL IN CLOUD ENVIRONMENTS
7. HYPOTHESIS
8. ALGORITHM FOR DEVELOPED MODEL
9. IMPLEMENTING PRIVATE CLOUD
10. CLOUD SECURITY FRAMEWORK
11. RESULTS
11.1 Evaluation of Developed Access Control Model
12. CLIENT-BASED USER AUTHENTICATION (CBUA)
12. EVALUATION OF DEVELOPED MODEL
13. PERFORMANCES
13.1 Security
REFERENCES
