Open Access Open Access  Restricted Access Subscription or Fee Access

Fuzzy Logic Based Secure Data Transfer and Retrival Using PBSA and AES for Resource Allocation in Cloud

S. Karthick Kumar, M.K. Nagarajan

Abstract


Now a day’s Cloud computing is one of the emerging technology. In this paper, we show how to securely store data in cloud and also how to access data from cloud storage Fuzzy Authorization means, checking wither the user is authorized or not. In order to communicate securely there must be secret key between the user and cloud provider. This Project aims to provide secure communication between one cloud parties to another cloud provider. A public key will be generated by key generator in the cloud for every registered user so as to communicate secretly. The number of cloud user in cloud computing growing in an exponential rate at every day. Then many users to access the same resource in the cloud .That time the server lead to high load. To reduce the high load problem using PBSA (Priority Based Scheduling Algorithm) and Load balancing algorithm. Sending the information from one to one communication is called data communication. Security is main problem in data communication .So to solve this problem using AES (Advanced Encryption Standard) algorithm .In this two algorithm achieve security and resource allocation in cloud computing. This Concept was achieved by FUZZY logic with the help of MATLAB tool.


Keywords


Fuzzy Authorization; Public Key; Cloud Computing;

Full Text:

PDF

References


Bethencourt. J, Sahai. A, and Waters. B (2007), “Ciphertext-Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.

Goyal. V, Pandey .O, Sahai. A, and Waters .B (2006), “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security, pp. 89-98.

Malik .S, "Dynamic Load Balancing in a Network of Workstation," 19 November 2000 2000

Mani Megalai. V.R, Mekala. R M.E.(Ph.D.)(2014),” A literature Survey on Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds using kdc” International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 3, Issue 12.

http://docs.hpcloud.com/pdf/static/Eucalyptus_4.0/install-guide-4.0.2.pdf

http://opensourceforu.efytimes.com/2014/03/build-private-cloud-eucalyptus/

http://www.seattlerobotics.org

Shasha Zhu and Guang Gong(2014)”Fuzzy Authorization for cloud Storage”, at IEEE Transactions on Cloud Computing, VOL. 2, NO. 4.

Sahai .A and Waters. B (2005), “Fuzzy Identity-Based Encryption,” Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 457-473.

Tassanaviboon .A and Gong .G (2011), “Oauth and abe based authorization in semi-trusted cloud computing,” in Proceedingsof the second international workshop on Data intensive computing in the clouds ACM, pp. 41–50.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.