A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing
Subject Areas : electrical and computer engineering
Azita Rezaei
1
,
Ali Broumandnia
2
*
,
Seyed Javad Mirabedini
3
1 - Ph.D. Student, Islamic Azad University-South Tehran Branch, Tehran, Iran
2 -
3 - Academic position, Department of Computer Engineering, Islamic Azad University-Central Tehran Branch, Tehran, Iran
Keywords: Broker security management, cryptography, data segmentation, multi-layer security (MLS) algorithm.,
Abstract :
Today, various clients use the cloud to transfer Thing by Internet (ETI). Many companies and organizations are persuaded to use the cloud utilities in secure environment. Beside of this technology is becoming popular, the risks and attacks on data are increasing. Ultimately, a security broker management in cloud services tries to balance security, performance, and availability features availabilities. This paper tries to increase the customer satisfaction index by creating 4 phases of security on the data process during transporting between the customer and the Cloud Service Provider (CSP), while increasing efficiency and availability. Tables and graphs show that the amount of the system allocated penalty is reduced by 61.41% and the customer satisfaction index has increased by 60.67%.