Fault-Tolerance and Transformation Analysis in Self-Tuning Servers
Pages : 1478-1481
Download PDF
Abstract
We presenting a framework for intrusion tolerance in cloud computing environment which review how a number of suspicion and security techniques, and to improve it up to the framework serves as an excellent platform for making cloud services intrusion tolerant. tolerant server’s to offer full functionality of self-healing which provides user self-governing and involuntary healing functionality, now here we are recommend new sketch for an intrusion-tolerant oriented self-healing server which move ahead performance quality of server. For secure data storage, we have used Checksum MD-5 code while storing and accessing the file. Checksum MD-5 code is used to provide intrusion tolerance for data servers in the cloud. It provides hidden intrusion, and the vulnerable prerequisite of intrusion tolerance, and further enhances the consistency and survivability of the intrusion-tolerant server.
Keywords: Malicious, Transformation, Intrusion, Self-tuning.
Article published in International Journal of Current Engineering and Technology, Vol.4,No.3 (June- 2014)