抽象的

AN EFFICIENT MODEL FOR PROVIDING SECURITY IN CLOUD COMPUTING ENVIRONMENT

Vikas Kumar , Sweta Pandey

In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today’s approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behaviour of the algorithms is much more similar as to be expected. A new model for cloud security is also proposed at the end. The results show that the new model is more efficient in comparison to the existing models.

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

谷歌学术
学术期刊数据库
打开 J 门
学术钥匙
研究圣经
引用因子
电子期刊图书馆
参考搜索
哈姆达大学
学者指导
国际创新期刊影响因子(IIJIF)
国际组织研究所 (I2OR)
宇宙

查看更多