Security in cloud over the virtual Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
The Security issues in cloud concerns and mainly associated with security issues faced by cloud service providers and the service issues faced by the cloud customers. The administrator will track the information of both authorized and unauthorized person. If they are unauthorized means the used will be blocked automatically. The process will done through the deterrent application. A deterrent is a system designed to prevent unauthorized access from a private network. Create a deterrent rule that permits the ping command first and identify the unwanted request. If the IP address of request is correct the connection is granted to SQL Database server. If the IP address request is not within the range specified, then connection is failed.The connection established only when the client passes through deterrent in sql database. Deterrent Technique is proposed for security System. It is generated for the application of deterrent viewer. Physical address, IP address are used to block the authorized person.
Authors and Affiliations
S. Kalaiarasi Karunya , A. Umamageswari
A Study on Islanded and Parallel Operation of Inverters in a Microgrid Using Droop Control Strategy
Microgrids (MG) have gained major importance in the recent years, where much attention is given to the control of microgrid. In this context, this paper presents the droop control strategy in an islanded microgrid. Init...
Reduced Effect of Vibration by Using Different Liquids in Tuned Liquid Column Damper: an Overview
An earthquake is the identifiable shaking of the surface of the earth, results in the instant release of kinetic energy in the form of seismic waves. It could be enough for the destruction of structures and thus result...
Multi-Hop LEACH with Energy Based Cluster Head Rotation
Wireless Sensor Network (WSN) is a growing field of interest now days. It is attracting researchers in application areas of surveillance, defense, security, patient monitoring, automated perking, weather forecasting, et...
Novel Method for Sensitivity Analysis of Fully Fuzzy Linear Programming Problem by Tabular Method
In the literature, there are various methods that deals with the sensitivity analysis of such linear programming problem in which some or all parameters are represented by triangular or trapezoidal fuzzy numbers by conv...
Setting Time and Sem Analysis For Cement Mortar Containing Partial Replacement Of Fine Aggregate By Green Sand And Bottom Ash
Cement, Sand and Aggregate are essential need for construction firm. Consumption of cement is high, due to large use of concrete and mortar. Cement, sand and aggregate are basic needs for any construction industry. Sand...