AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT
Journal: ICTACT Journal on Soft Computing (IJSC) (Vol.6, No. 3)Publication Date: 2016-04-01
Authors : R Poorva Devi; S Rajalakshmi;
Page : 1177-1182
Keywords : Cloud Service Provider; Cloud Vendor; RMMM; Fuzzy Rule Systems; Managed Service Provider; Cloud Clients; Cloud Security; Apache Cloud Stack Simulator Tool.;
Abstract
So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP). However cloud is providing one of the services is, security-as-a-service to its clients, still people are terrified to use the service from cloud vendor. Number of solutions, security components and measurements are coming with the new scope for the cloud security issue, but 79.2% security outcome only obtained from the different scientists, researchers and other cloud based academy community. To overcome the problem of cloud security the proposed model that is, “Quality based Enhancing the user data protection via fuzzy rule based systems in cloud environment”, will helps to the cloud clients by the way of accessing the cloud resources through remote monitoring management (RMMM) and what are all the services are currently requesting and consuming by the cloud users that can be well analyzed with Managed service provider (MSP) rather than a traditional CSP. Normally, people are trying to secure their own private data by applying some key management and cryptographic based computations again it will direct to the security problem. In order to provide good quality of security target result by making use of fuzzy rule based systems (Constraint & Conclusion segments) in cloud environment. By using this technique, users may obtain an efficient security outcome through the cloud simulation tool of Apache cloud stack simulator.
Other Latest Articles
- SIMULATION OF WIRELESS SENSOR NETWORK WITH HYBRID TOPOLOGY
- STRENGTHENING ENCRYPTION SECRECY FOR PRIVATE SEARCH USING FULLY HOMOMORPHIC ENCRYPTION
- DIGITAL DATA PROTECTION USING STEGANOGRAPHY
- EFFECT OF MOBILITY ON SINR IN LONG TERM EVOLUTION SYSTEMS
- IMPACT OF BUFFER SIZE ON PQRS AND D-PQRS SCHEDULING ALGORITHMS
Last modified: 2016-09-15 15:25:14