A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing
American Journal of Data Mining and Knowledge Discovery
Volume 1, Issue 1, December 2016, Pages: 1-6
Received: Oct. 27, 2016; Accepted: Nov. 14, 2016; Published: Dec. 17, 2016
Views 2928      Downloads 104
Authors
R. Poorvadevi, SCSVMV University, Kanchipuram, Tamilnadu, India
S. Rajalakshmi, SCSVMV University, Kanchipuram, Tamilnadu, India
Article Tools
Follow on us
Abstract
So far, in cloud computing lots of services are consumed by the distinct clients. However, cloud is providing all kind of services (everything as a service - Xaas) to its dependent users. Still, there will be efficient security procedures and parameters are needed in the client end. Cloud service providers are offering the service with proper security perimeter control. After receiving the service from the CSP, users are losing the security control over their confidential data. So, protecting the user secret data is essential. The proposed approach will be used for securing the data by authenticating the registered user through the fuzzy associative memory (FAM) technique. This approach mainly focuses on one / two dimensional data access point might be considered for user authenticity computational process in order to increase the performance level of data security. This can be achieved by using the green cloud simulator tool in cloud environment.
Keywords
Cloud Vendor, Fuzzy Associative Memory (FAM), Cloud Service Provider (CSP), Cloud Clients, Data Security and Green Cloud Sim
To cite this article
R. Poorvadevi, S. Rajalakshmi, A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing, American Journal of Data Mining and Knowledge Discovery. Vol. 1, No. 1, 2016, pp. 1-6. doi: 10.11648/j.ajdmkd.20160101.11
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Miyoung jang; Min Yoon; Jae-Woo Chang, paper entitled as “A Privacy-aware query authentication index for database outsourcing” IEEE conference publications 2014.
[2]
Confidentiality-Preserving Image Search: A Comparative Study between Homomorphic Encryption and Distance-Preserving Randomization author: Wenjun Lu; Google, Mountain View, CA, USA; Varna, A.L.; Min Wu IEEE transactions on volume 2 – 2014.
[3]
Bio-cryptographic authentication in cloud storage sharing author: Velciu, M.; Comput. Sci. Dept, Mil. Tech. Acad., Bucharest, Romania; Patrascu, A.; Patrice, V. IEEE 9th International symposium on Applied Computational Intelligence and Informatics (SACI), 2014.
[4]
Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme author: Poornima, B.; Rajendran, T. World Congress on Computing and Communication Technologies (WCCCT), 2014 march-14.
[5]
Analysis and prevention of vulnerabilities in cloud applications domains Durrani, IEEE Conference on Information Assurance and Cyber Security (CIACS), 2014.
[6]
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine Grained Updates Chang Liu; Fac. of Eng. & IT, Univ. of Tech., Sydney, NSW, Australia and more authors Parallel and Distributed Systems, IEEE Transactions on cloud computing- 2014.
[7]
Effective Third Party Auditing in Cloud Computing Hussain, M.; Dept. of Interdiscipl. Studies, Zayed Univ. Dubai, Advanced Information Networking and Applications Workshops (WAINA), 28th International Conference on13-16 May 2014.
[8]
Implementation of a secure genome sequence search platform on public cloud leveraging open source solutions authors: VikasSaxena, et al. Journal of Cloud Computing: Advances, Systems and Applications-2014.
[9]
A multi level security model for partitioning workflows over federated clouds authors: Paul Watson journal of cloud computing 2014.
[10]
Scalable transactions in cloud data stores author: Ahirrao S, Ingle R, Springer series. Journal of Cloud Computing: Advances, Systems and Applications, November–2015. Virtual machine introspection: towards bridging the semantic gap MoreA, Tapaswi S, Journal of Cloud Computing-2014.
[11]
Clustering based fragmentation and data replication for flexible query answering in distributed databases, WieseL, Journal of Cloud Computing- 2014.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186