DocumentCode :
3670278
Title :
Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment
Author :
N. Nagalakshmi;S. Rajalakshmi
Author_Institution :
Jay Shriram Group Of Institutions, Avinashipalayam, Koduvai
fYear :
2015
Firstpage :
17
Lastpage :
22
Abstract :
Cloud computing is a new style of computing in which dynamically scalable and often virtualized resources are provided as service over internet. Resource procurement of cloud resources is an interesting and yet unexplored area in cloud computing, to automates the selection of resources for cloud vendor becomes a challenging issue in recent years. This problem is solve by using three novel mechanism for cloud vendor with resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). In C-OPT modules, where the resource allocation is performed based host winner value, the major issue of the work is that authentication is performed for each cloud user. To solve security issue problem in the cloud resource procurement approach, in this work introduce a novel expectation maximization (EM) algorithm for cloud optimal modules resources. The proposed EM methods are used for finding maximum likelihood depends on unobserved latent cloud resource variables for virtual cost and quality of service constraints. To authenticate the cloud user data, cryptography method is introduced in this proposed work. The proposed cryptographic method follows the procedure of Elliptic curve cryptography for authenticating users and cloud vendors. Key values between the cloud user and cloud vendors are exchanged. Each and every key is verified by both cloud user and cloud vendor. If the key value anyone becomes wrong the resource Procurement is not allocated to cloud user, since these users becomes unauthenticated user, there are not allowed to performed resource Procurement process. A cloud broker with such a procurement module enables users to automate the choice of a cloud vendor. Our experiments indicate that the resource procurement cost decrease by calculation of the expectation maximization algorithm and more security than the existing COPT methods by using the elliptic curve cryptography with increase in number of cloud vendors irrespective of the mechanisms.
Keywords :
"Procurement","Quality of service","Cloud computing","Resource management","Elliptic curve cryptography","Algorithm design and analysis"
Publisher :
ieee
Conference_Titel :
Computing, Communication and Information Systems (NCCCIS), 2015 IEEE Seventh National Conference on
Type :
conf
DOI :
10.1109/NCCCIS.2015.7295903
Filename :
7295903
Link To Document :
بازگشت