So far, in cloud computing lots of services are consumed by the distinct clients. However, cloud is providing all kind of services (everything as a service - Xaas) to its dependent users. Still, there will be efficient security procedures and parameters are needed in the client end. Cloud service providers are offering the service with proper security perimeter control. After receiving the service from the CSP, users are losing the security control over their confidential data. So, protecting the user secret data is essential. The proposed approach will be used for securing the data by authenticating the registered user through the fuzzy associative memory (FAM) technique. This approach mainly focuses on one / two dimensional data access point might be considered for user authenticity computational process in order to increase the performance level of data security. This can be achieved by using the green cloud simulator tool in cloud environment.
Published in | American Journal of Data Mining and Knowledge Discovery (Volume 1, Issue 1) |
DOI | 10.11648/j.ajdmkd.20160101.11 |
Page(s) | 1-6 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2016. Published by Science Publishing Group |
Cloud Vendor, Fuzzy Associative Memory (FAM), Cloud Service Provider (CSP), Cloud Clients, Data Security and Green Cloud Sim
[1] | Miyoung jang; Min Yoon; Jae-Woo Chang, paper entitled as “A Privacy-aware query authentication index for database outsourcing” IEEE conference publications 2014. |
[2] | Confidentiality-Preserving Image Search: A Comparative Study between Homomorphic Encryption and Distance-Preserving Randomization author: Wenjun Lu; Google, Mountain View, CA, USA; Varna, A.L.; Min Wu IEEE transactions on volume 2 – 2014. |
[3] | Bio-cryptographic authentication in cloud storage sharing author: Velciu, M.; Comput. Sci. Dept, Mil. Tech. Acad., Bucharest, Romania; Patrascu, A.; Patrice, V. IEEE 9th International symposium on Applied Computational Intelligence and Informatics (SACI), 2014. |
[4] | Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme author: Poornima, B.; Rajendran, T. World Congress on Computing and Communication Technologies (WCCCT), 2014 march-14. |
[5] | Analysis and prevention of vulnerabilities in cloud applications domains Durrani, IEEE Conference on Information Assurance and Cyber Security (CIACS), 2014. |
[6] | Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine Grained Updates Chang Liu; Fac. of Eng. & IT, Univ. of Tech., Sydney, NSW, Australia and more authors Parallel and Distributed Systems, IEEE Transactions on cloud computing- 2014. |
[7] | Effective Third Party Auditing in Cloud Computing Hussain, M.; Dept. of Interdiscipl. Studies, Zayed Univ. Dubai, Advanced Information Networking and Applications Workshops (WAINA), 28th International Conference on13-16 May 2014. |
[8] | Implementation of a secure genome sequence search platform on public cloud leveraging open source solutions authors: VikasSaxena, et al. Journal of Cloud Computing: Advances, Systems and Applications-2014. |
[9] | A multi level security model for partitioning workflows over federated clouds authors: Paul Watson journal of cloud computing 2014. |
[10] | Scalable transactions in cloud data stores author: Ahirrao S, Ingle R, Springer series. Journal of Cloud Computing: Advances, Systems and Applications, November–2015. Virtual machine introspection: towards bridging the semantic gap MoreA, Tapaswi S, Journal of Cloud Computing-2014. |
[11] | Clustering based fragmentation and data replication for flexible query answering in distributed databases, WieseL, Journal of Cloud Computing- 2014. |
APA Style
R. Poorvadevi, S. Rajalakshmi. (2016). A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing. American Journal of Data Mining and Knowledge Discovery, 1(1), 1-6. https://doi.org/10.11648/j.ajdmkd.20160101.11
ACS Style
R. Poorvadevi; S. Rajalakshmi. A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing. Am. J. Data Min. Knowl. Discov. 2016, 1(1), 1-6. doi: 10.11648/j.ajdmkd.20160101.11
@article{10.11648/j.ajdmkd.20160101.11, author = {R. Poorvadevi and S. Rajalakshmi}, title = {A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing}, journal = {American Journal of Data Mining and Knowledge Discovery}, volume = {1}, number = {1}, pages = {1-6}, doi = {10.11648/j.ajdmkd.20160101.11}, url = {https://doi.org/10.11648/j.ajdmkd.20160101.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajdmkd.20160101.11}, abstract = {So far, in cloud computing lots of services are consumed by the distinct clients. However, cloud is providing all kind of services (everything as a service - Xaas) to its dependent users. Still, there will be efficient security procedures and parameters are needed in the client end. Cloud service providers are offering the service with proper security perimeter control. After receiving the service from the CSP, users are losing the security control over their confidential data. So, protecting the user secret data is essential. The proposed approach will be used for securing the data by authenticating the registered user through the fuzzy associative memory (FAM) technique. This approach mainly focuses on one / two dimensional data access point might be considered for user authenticity computational process in order to increase the performance level of data security. This can be achieved by using the green cloud simulator tool in cloud environment.}, year = {2016} }
TY - JOUR T1 - A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing AU - R. Poorvadevi AU - S. Rajalakshmi Y1 - 2016/12/17 PY - 2016 N1 - https://doi.org/10.11648/j.ajdmkd.20160101.11 DO - 10.11648/j.ajdmkd.20160101.11 T2 - American Journal of Data Mining and Knowledge Discovery JF - American Journal of Data Mining and Knowledge Discovery JO - American Journal of Data Mining and Knowledge Discovery SP - 1 EP - 6 PB - Science Publishing Group SN - 2578-7837 UR - https://doi.org/10.11648/j.ajdmkd.20160101.11 AB - So far, in cloud computing lots of services are consumed by the distinct clients. However, cloud is providing all kind of services (everything as a service - Xaas) to its dependent users. Still, there will be efficient security procedures and parameters are needed in the client end. Cloud service providers are offering the service with proper security perimeter control. After receiving the service from the CSP, users are losing the security control over their confidential data. So, protecting the user secret data is essential. The proposed approach will be used for securing the data by authenticating the registered user through the fuzzy associative memory (FAM) technique. This approach mainly focuses on one / two dimensional data access point might be considered for user authenticity computational process in order to increase the performance level of data security. This can be achieved by using the green cloud simulator tool in cloud environment. VL - 1 IS - 1 ER -