Loading

Security Improvement in Open Cloud Environment Using Arithmetic Algorithm
R. Parthiban1, S. G. Sandhya2, U. Palani3, D. Saravanan4

1R. Parthiban, Associate Professor, Department of CSE, IFET College of Engineering, Villupuram (Tamil Nadu), India.
2S. G. Sandhya, Associate Professor, Department of CSE, IFET College of Engineering, Villupuram (Tamil Nadu), India.
3D. Saravanan, Associate Professor, Department of CSE, IFET College of Engineering, Villupuram (Tamil Nadu), India.
4U. Palani, Professor, Department of ECE, IFET College of Engineering, Villupuram (Tamil Nadu), India.
Manuscript received on 11 May 2019 | Revised Manuscript received on 19 May 2019 | Manuscript Published on 23 May 2019 | PP: 1727-1731 | Volume-7 Issue-6S5 April 2019 | Retrieval Number: F13070476S519/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Based works do not provide a detailed methodological approach to elicit security and privacy requirements but methods to select cloud deployment models based on satisfaction of these requirements by Cloud Service Providers. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context.
Keywords: Cloud Deployment, Security, Privacy.
Scope of the Article: Cloud Resources Utilization in IoT