AN Optimal Matrix Approach for virtual load allocation and data sharing
Keywords:
Cloud distributed technique, Security technique, accessing mechanism, cloud application, data monitoring & verificationAbstract
Distributed technology which means to the cloud is commonly used service today for many industries as well
as personal level. Users are utilizing the cloud service, its model for reliable and secure storage for their data. All the
cloud service provider gives inbuild algorithms, which help in providing data security, integrity verification as well as
ease of access utility. Different level of security and accessing mechanism for the range of user is provided. Cloud
computing having an architecture which gives an advantage than the tradition approach. Previous approach of security
over the cloud face challenging issues such as high computation time, low level of encryption key in use. This approach
lacks in modern attack defense which usually occurs over the network. In order to prevent these attack and data misuse
an efficient storage, security and accessing mechanism over the data storage is required. In this paper a proposed for the
data security algorithm and access mechanism for the user data is given. This paper also depicts the implementation of
algorithm, its proper working model as well as the efficiency of algorithm. The proposed algorithm is implemented and
compared with traditional security techniques. Results were observed by giving multiple user input files. Monitored
results shows the low computation time, cost as well as high resistance over the input file attacks.
Our further work is going to run towards finding its real time application usage and providing an open source platform
for the user for public use.