A Security Solution for Cloud Users to Protect the Private Data through Fuzzy Bayesian Decision Method (FBDM)

نویسندگان

  • R. Poorvadevi
  • S. Rajalakshmi
  • G. Supraja Devi
چکیده

Fuzzy technique is a forum which provides the linguistic object sets and solutions in certainty and uncertainty based elements. Numbers of decisions were derived for various domains by using the fuzzy modeling method. In fuzzy there will be a one approach is, appropriate and approximate reasoning, this can be used to find the solution for critical problem which is happening in all platforms. Likewise, by using fuzzy Bayesian decision method we are trying to obtain the solution for cloud security and privacy issue. If user is consuming any resource or services from the cloud service provider such as, communication, monitoring services, instant transaction, verification of service availability, ensuring the service access privileges, however these applications and processing data sets are stored in the cloud database. Still, customers do not believe the security measurements and storage of secret information which is offered by the cloud vendors. Cloud users are in need of protecting the confidential or private data by embedding and applying their own security tools and parameters. This proposed model which helps to an end-users whoever in need of securing the individual data in cloud environment by using the certain sort of mathematical based derived functions and apply these outcomes into the fuzzy Bayesian decision block to eliminate and prohibit the hackers entry by setting the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification and Prioritization of Factors Contributing in Cloud Service Selection Using Fuzzy Best-worst Method (FBWM)

The introduction of cloud computing techniques revolutionized the current of information processing and storing. Cloud computing as a competitive edge provides easy and automated access to the vast ocean of resources through standard network mechanisms to businesses and organizations. Due to the vast diversity of service providers and their respective variety of available services with differen...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

An Efficient Resource Allocation for Processing Healthcare Data in the Cloud Computing Environment

Nowadays, processing large-media healthcare data in the cloud has become an effective way of satisfying the medical userschr('39') QoS (quality of service) demands. Providing healthcare for the community is a complex activity that relies heavily on information processing. Such processing can be very costly for organizations. However, processing healthcare data in cloud has become an effective s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015