Please use this identifier to cite or link to this item:
|Title:||A CRYPTOGRAPHIC APPROACH FOR LICENSE MANAGEMENT IN CLOUD COMPUTING|
|Keywords:||CLOUD COMPUTING;CLPL;CRYPTOGRAPHIC;ELECTRONICS AND COMPUTER ENGINEERING|
|Abstract:||Computational world is become very large and complex. Cloud computing has emerged as a popular computing model to support on demand services. It has inherited the legacy technology and adding new ideas. The goal of cloud computing is to make effective utilization of distributed resources, put them together in order to achieve higher throughput and be able to perform high scale computation problem. In this dissertation entitled "A Cryptographic Approach for License Management in Cloud Computing", a framework is proposed which addresses the major challenges in license management. This framework overcomes the problems in handling large number of temporary license in cloud computing. This model also provide a secure license exchange methodology for communication between the entities of cloud computing. But before implement a license management system for cloud environment one must understand the main structure of license pattern, which indicate an agreements to establish a legal relationship between cloud provider and cloud user. In cloud computing, the license not only deals with software services, but also it should able to provide an agreement for infrastructure and platform services in an effective way. Thus traditional license management pattern is not able to specify all necessary specification of agreement of cloud services. In this dissertation, We provide a generalize model of license pattern language, called Cloud License Pattern Language(CLPL), which meet all requirement for licensing a service in cloud computing environment. At the end of the dissertation, we also deal with the real application of License management in secure cloud storage as a case study. The proposed model has implemented and. tested. We analyze the performance of license generation, license exchange overhead and encryption -decryption time requirement. The analysis results are also compared with GEN-LM license module. The results validate the correctness of the framework.|
|Research Supervisor/ Guide:||Joshi, R. C.|
|Appears in Collections:||MASTERS' DISSERTATIONS (E & C)|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.