CFP last date
20 January 2025
Reseach Article

A Security Solution for Cloud Users to Protect the Private Data through Fuzzy Bayesian Decision Method (FBDM)

by R.poorvadevi, S.rajalakshmi, G.supraja Devi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 16
Year of Publication: 2015
Authors: R.poorvadevi, S.rajalakshmi, G.supraja Devi
10.5120/19911-2024

R.poorvadevi, S.rajalakshmi, G.supraja Devi . A Security Solution for Cloud Users to Protect the Private Data through Fuzzy Bayesian Decision Method (FBDM). International Journal of Computer Applications. 113, 16 ( March 2015), 17-21. DOI=10.5120/19911-2024

@article{ 10.5120/19911-2024,
author = { R.poorvadevi, S.rajalakshmi, G.supraja Devi },
title = { A Security Solution for Cloud Users to Protect the Private Data through Fuzzy Bayesian Decision Method (FBDM) },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 16 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number16/19911-2024/ },
doi = { 10.5120/19911-2024 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:07.030369+05:30
%A R.poorvadevi
%A S.rajalakshmi
%A G.supraja Devi
%T A Security Solution for Cloud Users to Protect the Private Data through Fuzzy Bayesian Decision Method (FBDM)
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 16
%P 17-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fuzzy technique is a forum which provides the linguistic object sets and solutions in certainty and uncertainty based elements. Numbers of decisions were derived for various domains by using the fuzzy modeling method. In fuzzy there will be a one approach is, appropriate and approximate reasoning, this can be used to find the solution for critical problem which is happening in all platforms. Likewise, by using fuzzy Bayesian decision method we are trying to obtain the solution for cloud security and privacy issue. If user is consuming any resource or services from the cloud service provider such as, communication, monitoring services, instant transaction, verification of service availability, ensuring the service access privileges, however these applications and processing data sets are stored in the cloud database. Still, customers do not believe the security measurements and storage of secret information which is offered by the cloud vendors. Cloud users are in need of protecting the confidential or private data by embedding and applying their own security tools and parameters. This proposed model which helps to an end-users whoever in need of securing the individual data in cloud environment by using the certain sort of mathematical based derived functions and apply these outcomes into the fuzzy Bayesian decision block to eliminate and prohibit the hackers entry by setting the threshold log value in cloud environment to achieve an efficient security results

References
  1. Truong- Huu. T "A novel model for competition and cooperation among cloud providers" IEEE transactions on cloud computing volume 2, issue 3, 2014.
  2. Tchana. A; Dilenseger. B; De palma. N; J, salmi; A. Harbaoui "A self-scalable and auto regulated request injection benchmarking tool for automatic saturation detection" IEEE transactions on cloud computing volume 2, issue 3, 2014.
  3. Toma's. L; Tordsson. J "An automatic approach to risk-aware data center overbooking" IEEE transactions on cloud computing volume 2, issue 3, 2014.
  4. Wang's; Shi. W; "Budget-driven scheduling algorithms for batches of map reduce jobs in heterogeneous clouds" IEEE transactions on cloud computing volume 2, issue 3.
  5. Guan. B; Wu. J; Wang. Y; Khan. S. U "CIV scheduled communication – aware inter-VM scheduling technique for decreased network latency between co-located VM's", IEEE transactions on cloud computing volume 2 , issue 3 , 2014
  6. Tang. S; Lee. B; He. B; "Dynamic MR: A dynamic slot allocation optimization framework for Map reduce clusters" IEEE transactions on cloud computing volume 2 , issue 3 , 2014
  7. Konstanteli. K; Cucinotta. T; Psyches'. K; A. Varvarigou. T "Elastic admission control for federated cloud services" IEEE transactions on cloud computing.
  8. Kailasam. S; Dhawalia. P; Balaji. S. J; Iyer. G; Dharanipragada. J "Extending Map-reduce across clouds with Bstream" IEEE transactions on cloud computing.
  9. Sheng Di, Member, IEEE, Cho-Li Wang, Member, IEEE, and Franck Cappello, IEEE Member, paper entitled as, "Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors" IEEE transactions on cloud computing, vol. 2, no. 2, April-June 2014.
  10. Sudip Misra, Senior Member, IEEE, Snigdha Das, Manas Khatua, Student Member, IEEE, and Mohammad S. Obaidat, IEEE Fellow, paper entitled as, "Qos-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment" IEEE transactions on cloud computing, vol. 2, no. 2, April-June 2014
  11. Amir Vahid Dastjerdi, Member, IEEE and Rajkumar Buyya, Senior Member, paper entitled as, "Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users" IEEE transactions on cloud computing, vol. 2, no. 1, January-March 2014.
  12. Hossein Morshedlou and Mohammad Reza Meybodi paper entitled as, "Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing environments" IEEE transactions on cloud computing, vol 2, no. 2, April – June 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud vendor Fuzzy Bayesian computation block fuzzy threshold analyzer Cloud service provider and Apache cloud stack simulator tool