| Peer-Reviewed

A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing

Received: 27 October 2016    Accepted: 14 November 2016    Published: 17 December 2016
Views:       Downloads:
Abstract

So far, in cloud computing lots of services are consumed by the distinct clients. However, cloud is providing all kind of services (everything as a service - Xaas) to its dependent users. Still, there will be efficient security procedures and parameters are needed in the client end. Cloud service providers are offering the service with proper security perimeter control. After receiving the service from the CSP, users are losing the security control over their confidential data. So, protecting the user secret data is essential. The proposed approach will be used for securing the data by authenticating the registered user through the fuzzy associative memory (FAM) technique. This approach mainly focuses on one / two dimensional data access point might be considered for user authenticity computational process in order to increase the performance level of data security. This can be achieved by using the green cloud simulator tool in cloud environment.

Published in American Journal of Data Mining and Knowledge Discovery (Volume 1, Issue 1)
DOI 10.11648/j.ajdmkd.20160101.11
Page(s) 1-6
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Previous article
Keywords

Cloud Vendor, Fuzzy Associative Memory (FAM), Cloud Service Provider (CSP), Cloud Clients, Data Security and Green Cloud Sim

References
[1] Miyoung jang; Min Yoon; Jae-Woo Chang, paper entitled as “A Privacy-aware query authentication index for database outsourcing” IEEE conference publications 2014.
[2] Confidentiality-Preserving Image Search: A Comparative Study between Homomorphic Encryption and Distance-Preserving Randomization author: Wenjun Lu; Google, Mountain View, CA, USA; Varna, A.L.; Min Wu IEEE transactions on volume 2 – 2014.
[3] Bio-cryptographic authentication in cloud storage sharing author: Velciu, M.; Comput. Sci. Dept, Mil. Tech. Acad., Bucharest, Romania; Patrascu, A.; Patrice, V. IEEE 9th International symposium on Applied Computational Intelligence and Informatics (SACI), 2014.
[4] Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme author: Poornima, B.; Rajendran, T. World Congress on Computing and Communication Technologies (WCCCT), 2014 march-14.
[5] Analysis and prevention of vulnerabilities in cloud applications domains Durrani, IEEE Conference on Information Assurance and Cyber Security (CIACS), 2014.
[6] Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine Grained Updates Chang Liu; Fac. of Eng. & IT, Univ. of Tech., Sydney, NSW, Australia and more authors Parallel and Distributed Systems, IEEE Transactions on cloud computing- 2014.
[7] Effective Third Party Auditing in Cloud Computing Hussain, M.; Dept. of Interdiscipl. Studies, Zayed Univ. Dubai, Advanced Information Networking and Applications Workshops (WAINA), 28th International Conference on13-16 May 2014.
[8] Implementation of a secure genome sequence search platform on public cloud leveraging open source solutions authors: VikasSaxena, et al. Journal of Cloud Computing: Advances, Systems and Applications-2014.
[9] A multi level security model for partitioning workflows over federated clouds authors: Paul Watson journal of cloud computing 2014.
[10] Scalable transactions in cloud data stores author: Ahirrao S, Ingle R, Springer series. Journal of Cloud Computing: Advances, Systems and Applications, November–2015. Virtual machine introspection: towards bridging the semantic gap MoreA, Tapaswi S, Journal of Cloud Computing-2014.
[11] Clustering based fragmentation and data replication for flexible query answering in distributed databases, WieseL, Journal of Cloud Computing- 2014.
Cite This Article
  • APA Style

    R. Poorvadevi, S. Rajalakshmi. (2016). A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing. American Journal of Data Mining and Knowledge Discovery, 1(1), 1-6. https://doi.org/10.11648/j.ajdmkd.20160101.11

    Copy | Download

    ACS Style

    R. Poorvadevi; S. Rajalakshmi. A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing. Am. J. Data Min. Knowl. Discov. 2016, 1(1), 1-6. doi: 10.11648/j.ajdmkd.20160101.11

    Copy | Download

    AMA Style

    R. Poorvadevi, S. Rajalakshmi. A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing. Am J Data Min Knowl Discov. 2016;1(1):1-6. doi: 10.11648/j.ajdmkd.20160101.11

    Copy | Download

  • @article{10.11648/j.ajdmkd.20160101.11,
      author = {R. Poorvadevi and S. Rajalakshmi},
      title = {A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing},
      journal = {American Journal of Data Mining and Knowledge Discovery},
      volume = {1},
      number = {1},
      pages = {1-6},
      doi = {10.11648/j.ajdmkd.20160101.11},
      url = {https://doi.org/10.11648/j.ajdmkd.20160101.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajdmkd.20160101.11},
      abstract = {So far, in cloud computing lots of services are consumed by the distinct clients. However, cloud is providing all kind of services (everything as a service - Xaas) to its dependent users. Still, there will be efficient security procedures and parameters are needed in the client end. Cloud service providers are offering the service with proper security perimeter control. After receiving the service from the CSP, users are losing the security control over their confidential data. So, protecting the user secret data is essential. The proposed approach will be used for securing the data by authenticating the registered user through the fuzzy associative memory (FAM) technique. This approach mainly focuses on one / two dimensional data access point might be considered for user authenticity computational process in order to increase the performance level of data security. This can be achieved by using the green cloud simulator tool in cloud environment.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - A Scheme for Improving the Performance of User Authenticity Through Client Validation Process Using Fuzzy Associative Memory (FAM) in Cloud Computing
    AU  - R. Poorvadevi
    AU  - S. Rajalakshmi
    Y1  - 2016/12/17
    PY  - 2016
    N1  - https://doi.org/10.11648/j.ajdmkd.20160101.11
    DO  - 10.11648/j.ajdmkd.20160101.11
    T2  - American Journal of Data Mining and Knowledge Discovery
    JF  - American Journal of Data Mining and Knowledge Discovery
    JO  - American Journal of Data Mining and Knowledge Discovery
    SP  - 1
    EP  - 6
    PB  - Science Publishing Group
    SN  - 2578-7837
    UR  - https://doi.org/10.11648/j.ajdmkd.20160101.11
    AB  - So far, in cloud computing lots of services are consumed by the distinct clients. However, cloud is providing all kind of services (everything as a service - Xaas) to its dependent users. Still, there will be efficient security procedures and parameters are needed in the client end. Cloud service providers are offering the service with proper security perimeter control. After receiving the service from the CSP, users are losing the security control over their confidential data. So, protecting the user secret data is essential. The proposed approach will be used for securing the data by authenticating the registered user through the fuzzy associative memory (FAM) technique. This approach mainly focuses on one / two dimensional data access point might be considered for user authenticity computational process in order to increase the performance level of data security. This can be achieved by using the green cloud simulator tool in cloud environment.
    VL  - 1
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • SCSVMV University, Kanchipuram, Tamilnadu, India

  • SCSVMV University, Kanchipuram, Tamilnadu, India

  • Sections