Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      30 Dec 2022, Volume 37 Issue 5   
    Article

    IMPLEMENTATION OF ADAPTIVE CLOUD SECURITY FRAMEWORK FOR CLOUD COMPUTING MONITORING SYSTEM APPLICATIONS
    Kadapa Suneel Kumar and Dr. Nisarg Gandhewar
    Journal of Data Acquisition and Processing, 2022, 37 (5): 1394-1401 . 

    Abstract

    Various organizations implement cloud computing to store a significant amount of data in the clouds. Therefore, it may be necessary to secure data that may also be in the form of text, audio, video, and many other types. There are a number of algorithms created with the help of employing the researchers' methods for protecting the information in the cloud. In this paper implementation of Adaptive cloud security framework for cloud computing monitoring system applications. Cloud security has emerged as one of the most crucial challenges in cloud computing as a result of the industry's continued expansion. For instance, it is challenging to ensure the security of data hosted on a cloud platform since such data may be attacked. As a result, we must give consideration to the problem of how to safeguard data stored on the cloud. Data monitoring is a vital step in order to secure data. We create an autonomic computing-based cloud data monitoring system on the cloud platform, checking to see whether the data is out of the ordinary throughout the cycle and reviewing the security of the data in light of the results. In this paper, the feasibility of the scheme can be verified through simulation. The findings demonstrate that the suggested technique can properly assess the level of anomalous data and can adjust to the dynamic change in cloud platform load. Meanwhile, it increases the precision and timeliness of monitoring by automatically altering monitoring frequency. Additionally, it can lower the system's monitoring costs during routine operation.

    Keyword

    Cloud Computing, Cloud Security, Cloud Threats, Cloud Vulnerabilities, Data Security.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved