Multi-Level Multiple Security for CSP, Tenant & User via Edge System in Cloud

Authors

  • B.Angelm Rubavathy Dept, of Comp Applications, CSH, SRMIST, Kattankulathur – 603403, India.
  • Rebecca Jeyavadhanam Balasundaram Dept, of Comp Science, York St John University London, UK.
  • S. Albert Antony Raj Dept, of Comp Applications, CSH, SRMIST, Kattankulathur – 603403, India.

Keywords:

Optimized Scheduling (OS) Model, Tenant, Edge System, CSP, Profit/Loss Calculator and User

Abstract

In today’s era there are speed developments in Cloud Service Provider (CSP) and data allocation. The major concern in data allocation is inchoosing an accurate storage for the user data and allocating the data along with enhanced security. A proper resource allocation strategy should achieve elasticity and provide a high-levelsecurity to the user information. The system deliberates an ‘Optimized Allocation Strategy (OAS)for data allocation. The designed OAS algorithm provides an optimized Analysis over choosingsuitable service provider.Service providers allocate storage that scrutinizes the details.  Further, the system leverages a Benefit calculator that performs a mutual analysis over cloud server, Edge System, tenant and client. The system incorporates a multi-level security framework employing various cryptographic algorithms to bolster overall security. Empirical findings substantiate for cloud service providers and diverse user implementation with allocation strategies that the optimization algorithm proposed herein yields advantageous outcomes. Notably, the results indicate a notable improvement of over 50% in scheduling speed and security enhancement compared to extant models. The utilization of a multilevel security approach further amplifies the efficacy of the proposed model in contrast to its predecessors, affirming a heightened level of security.

Downloads

Published

2024-09-14

How to Cite

B.Angelm Rubavathy, Rebecca Jeyavadhanam Balasundaram, & S. Albert Antony Raj. (2024). Multi-Level Multiple Security for CSP, Tenant & User via Edge System in Cloud. Journal of Computational Analysis and Applications (JoCAAA), 33(08), 14–22. Retrieved from https://eudoxuspress.com/index.php/pub/article/view/1220

Issue

Section

Articles

Similar Articles

<< < 35 36 37 38 39 40 

You may also start an advanced similarity search for this article.