Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Implementation of Fuzzy Based Secure Cloud System


Affiliations
1 Department of Computer Sciences & IT, Nehru Arts and Science College (Autonomous), T. M. Palayam, Coimbatore – 641 105, Tamilnadu, India
     

   Subscribe/Renew Journal


In present scenario cloud computing is an emerging technique for real time applications. Cloud computing is a huge collection of interlinked network. Data security is a challenging task in cloud computing. Because of the benefits of cloud and every organization is moving its data towards cloud and it uses the storage service provided by the cloud provider. So there is a need to protect that data against malicious attacks, unauthorized access, modification or denial of services etc. There is need to ensure the security of cloud data that being exchanged between the users and the cloud. Many security algorithms are available in which mainly cryptography techniques are applied to secure data, but security of all these algorithms can be broken by anyone. Hence the new framework named as fuzzy logic are proposed to secure the data. The main aim of this technique is to provide security from vulnerable attacks in cloud environment. The performance of the proposed method outperforms well with efficient security.


Keywords

Cloud Computing, Fuzzy Logic, Data Storage, Cryptography and Data Security.
User
Subscription Login to verify subscription
Notifications
Font Size

  • Xiao, Z. and Xiao, Y., 2013. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), pp.843-859.
  • Khan, M.S.S. and Tuteja, R.R., 2014. Security in cloud computing using cryptographic algorithms. IJCA.
  • Singh, I. and Arora, A., 2015. Fuzzy Based Improved Multi Queue Job Scheduling For Cloud Computing. International Journal of Advanced Research in Computer Science, 6(5).
  • Katherine, A.V. and Alagarsamy, K., 2013. A fuzzy mathematical model for peformance testing in cloud computing using user defined parameters. International Journal of Software Engineering & Applications, 4(4), p.27.
  • Mehranzadeh, A. and Hashemi, S.M., 2013. A novel-scheduling algorithm for cloud computing based on fuzzy logic. International Journal of Applied Information Systems (IJAIS), 5(7).
  • Youssef, A.E. and Alageel, M., 2012. A framework for secure cloud computing. IJCSI International Journal of Computer Science Issues, 9(4), pp.1694-0814.
  • Bhore, R.S. and Sheikh, R., 2015. Technical Review on Security Issues & Cryptographic Algorithm in Cloud Computing.
  • Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), pp.1922-1926.
  • Pansotra, E.A. and Singh, E.S.P., 2015. Cloud security algorithms. International Journal of Security and Its Applications, 9(10), pp.353-360.
  • Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V. and Sastry, H., 2016. Security Algorithms for Cloud Computing. Procedia Computer Science, 85, pp.535-542.
  • Jensen, M., Schwenk, J., Gruschka, N. and Iacono, L.L., 2009, September. On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 109-116). IEEE.
  • Susila, N., Chandramathi, S. and Kishore, R., 2014. A fuzzy-based firefly algorithm for dynamic load balancing in cloud computing environment. Journal of Emerging Technologies in Web Intelligence, 6(4), pp.435-440.
  • Li, J., Wang, Q., Wang, C., Cao, N., Ren, K. and Lou, W., 2010, March. Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1-5). IEEE.
  • Chandran, K., Shanmugasudaram, V. and Subramani, K., 2016. Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing. Int. Arab J. Inf. Technol., 13(1), pp.30-37.
  • Zavvar, M., Rezaei, M., Garavand, S. and Ramezani, F., 2016. Fuzzy Logic-Based Algorithm Resource Scheduling for Improving The Reliability of Cloud Computing. Asia-Pacific Journal of Information Technology and Multimedia, 5(1).
  • Qu, C. and Buyya, R., 2014, May. A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In Advanced information networking and applications (aina), 2014 ieee 28th international conference on (pp. 850-857). IEEE.
  • Satsangi, R., Dashore, P. and Dubey, N., 2012. Risk management in cloud computing through fuzzy logic. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 1(4), p.144.

Abstract Views: 387

PDF Views: 1




  • A Novel Implementation of Fuzzy Based Secure Cloud System

Abstract Views: 387  |  PDF Views: 1

Authors

D. Kannan
Department of Computer Sciences & IT, Nehru Arts and Science College (Autonomous), T. M. Palayam, Coimbatore – 641 105, Tamilnadu, India

Abstract


In present scenario cloud computing is an emerging technique for real time applications. Cloud computing is a huge collection of interlinked network. Data security is a challenging task in cloud computing. Because of the benefits of cloud and every organization is moving its data towards cloud and it uses the storage service provided by the cloud provider. So there is a need to protect that data against malicious attacks, unauthorized access, modification or denial of services etc. There is need to ensure the security of cloud data that being exchanged between the users and the cloud. Many security algorithms are available in which mainly cryptography techniques are applied to secure data, but security of all these algorithms can be broken by anyone. Hence the new framework named as fuzzy logic are proposed to secure the data. The main aim of this technique is to provide security from vulnerable attacks in cloud environment. The performance of the proposed method outperforms well with efficient security.


Keywords


Cloud Computing, Fuzzy Logic, Data Storage, Cryptography and Data Security.

References