Professional Documents
Culture Documents
Performance
Accuracy and Precision
for
Secure Cloud Computing
Submitted by
Adithya Gulab(962611104002)
Prakash VL(962611104308)
Guide: D.K Kalaivani
INTRODUCTION
Cloud computing refers to both the applications delivered as services
over the internet and h/w and systems s/w in the data centres that
provide those services.
One of the most appealing effects of cloud computing is its elasticity.
To provide scalability and elasticity cloud services make heavy use of
authorization policies.
Authorization policies are which describes the conditions under
ABSTRACT
In distributed transactional database systems deployed over cloud
ARCHITECTURE
EXISTING
To provide scalability and elasticity, cloud services often make heavy
updates.
It is possible for external factors to cause user credential
PROPOSED SYSTEM
We formalize the concept of trusted transactions.
We define several different levels of policy consistency constraints
registered user.
To get output in user and publisher ranking basic to be secure and
view your search data also rank with us.
Both cluster indexing and document assignments are repeated
periodically to compensate churn, and to maintain an up-to-date
clustering solution.
Examples of document clustering include web document clustering
for search users. Ratings are implemented in separate users and
publishers.
servers.
A transaction is safe by checking policy, credential, and data
SYSTEM SPECIFICATIONS
HARDWARE SPECIFICATION
Processor
Primary Memory
Secondary Memory
Display
Key Board
CD-ROM Drive
Modem
:
:
:
:
SOFTWARE SPECIFICATION
Operating System
Web Server
Framework
Front End Tool
Back end Tool
Server side scripting
THANK YOU