AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff95d31e00000028c7040001000400
So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP). However cloud is providing one of the services is, security-as-a-service to its clients, still people are terrified to use the service from cloud vendor. Number of solutions, security components and measurements are coming with the new scope for the cloud security issue, but 79.2% security outcome only obtained from the different scientists, researchers and other cloud based academy community. To overcome the problem of cloud security the proposed model that is, “Quality based Enhancing the user data protection via fuzzy rule based systems in cloud environment”, will helps to the cloud clients by the way of accessing the cloud resources through remote monitoring management (RMMM) and what are all the services are currently requesting and consuming by the cloud users that can be well analyzed with Managed service provider (MSP) rather than a traditional CSP. Normally, people are trying to secure their own private data by applying some key management and cryptographic based computations again it will direct to the security problem. In order to provide good quality of security target result by making use of fuzzy rule based systems (Constraint & Conclusion segments) in cloud environment. By using this technique, users may obtain an efficient security outcome through the cloud simulation tool of Apache cloud stack simulator.

Authors
R Poorva Devi, S Rajalakshmi
Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya, India

Keywords
Cloud Service Provider, Cloud Vendor, RMMM, Fuzzy Rule Systems, Managed Service Provider, Cloud Clients, Cloud Security, Apache Cloud Stack Simulator Tool.
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
010000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Soft Computing
( Volume: 6 , Issue: 3 , Pages: 1177-1182 )
Date of Publication :
April 2016
Page Views :
116
Full Text Views :
1

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.