IDEAS home Printed from https://ideas.repec.org/a/ids/ijnvor/v21y2019i1p30-42.html
   My bibliography  Save this article

Privacy and security issues in cloud computing using idyllic approach

Author

Listed:
  • P. Santhosh Kumar
  • Latha Parthiban
  • V. Jegatheeswari

Abstract

Cloud provides the collection of virtual machine which have both computational and storage facility. The important aspect of cloud computing is to present effective process to hyper distributed resources. Now days, cloud system is developing and facing many challenges, two of them is scheduling process and other main challenge is a security issue. In existing approaches did not concentrate on both security and scheduling issues in the cloud computing. Scheduling refers to the scheduler adapts its scheduling strategy, according to the changing to a set of morals to control the order of work to be implemented by a computer system. In this research paper, we have implemented a scheduling algorithm of collocate FCFS of supremacy elements. Here, we improve the system efficiency by using FCFS in a parallel manner. To address this security issue, we have introduced a novel concept of Crisscross Advance Encryption Standard (CAES). In this approach, crisscross AES has implemented by increasing the security to the cloud through the grid manner. Aggregate of this proposed work is to enhance the system efficiency as well as the security by using the both crisscross AES and Collocate FCFS of supremacy elements.

Suggested Citation

  • P. Santhosh Kumar & Latha Parthiban & V. Jegatheeswari, 2019. "Privacy and security issues in cloud computing using idyllic approach," International Journal of Networking and Virtual Organisations, Inderscience Enterprises Ltd, vol. 21(1), pages 30-42.
  • Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:30-42
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=101146
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:30-42. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=22 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.