Fault-Tolerance and Transformation Analysis in Self-Tuning Servers

Authors

  • A. S. Alvi Computer Science, SGBAU Amravati, Amravati Maharashtra, India Author
  • Omprakash A. Jaisinghani Information Technology, SGBAU Amravati, Rampuri camp Amravati, Maharashtra, India Author

Keywords:

Malicious, Transformation, Intrusion, Self-tuning.

Abstract

We presenting a framework for intrusion tolerance in cloud computing environment which review how a number of suspicion and security techniques, and to improve it up to the framework serves as an excellent platform for making cloud services intrusion tolerant. tolerant server’s to offer full functionality of self-healing which provides user self-governing and involuntary healing functionality, now here we are recommend new sketch for an intrusion-tolerant oriented self-healing server which move ahead performance quality of server. For secure data storage, we have used Checksum MD-5 code while storing and accessing the file. Checksum MD-5 code is used to provide intrusion tolerance for data servers in the cloud. It provides hidden intrusion, and the vulnerable prerequisite of intrusion tolerance, and further enhances the consistency and survivability of the intrusion-tolerant server.

References

Downloads

Published

2014-06-30

Issue

Section

Articles

How to Cite

Fault-Tolerance and Transformation Analysis in Self-Tuning Servers. (2014). International Journal of Current Engineering and Technology, 4(3), 1478-1481. https://ijcet.evegenis.org/index.php/ijcet/article/view/732