ijaser
IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.
ABSTRACT--A cloud system is difficult to synchronize login
and authentication data between external clouds and internal systems without exposing internal security
data. The cloud technologies are rapidly being adopted throughout the
Information Technology (IT) due to their various attractive properties. In spite
of their spread, they have raised a range of significant security and privacy
concerns which interrupt their adoption in sensitive environments. The cloud
computing technology provides IT services and resources to the customers
through public network such as internet. The cloud computing services and
infrastructure are mostly owned by a third party called cloud service
providers. Mobile cloud computing provides a novel ecommerce mode for
organizations without any upfront investment. Since cloud computing uses
distributed resources in open environment, it is important to provide, we propose an effective and
secure distributed model including a Self-Proxy Server (SPS) with self-created
algorithm. The model resolves a communication bottleneck due to re-encryption
of a shared data in the cloud whenever users are revoked. It offers to reduce
security risks and protect their resources because a distributed SPS
dynamically interacts with Key Manager (KM) when the mobile users take on cloud
services. This technique includes if the fake user to know the details about
the password that is using the
hint given. To avoid the hacker
fuzzy authorization uses the technique if the entered password partially
matches the user can get the video that is the fake video. After that hacker
stop retrying the username and the password. The original data is taken a fter
real password is given by the real user.
[1]A.N.Khana, M.L.M.Kiaha, S.U.Khanb and S.A.Madanic, “Towards
Secure Mobile Cloud Computing: A Survey”, Future Generation Computer Systems, vol.29, Issues 5, July 2013.
[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee,
D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, Above the clouds: a Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb. 2009.
[3]R. Ranjan, A. Harwood, R. Buyya, Grid federation: an economy based distributedresourcemanagementsystemforlarge-scaleresourcecoupling,Technical Report GRIDS-TR-2004-10, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, 2004.
[4] R. Buyya, R. Ranjan, Federated resource management in grid and cloud computing systems, Future Generation Computer Systems 26 (8) (2006) 1189–1191.
-->