Mining user actions with fuzzy related data security conviction in cloud computing

Mining user actions with fuzzy related data security conviction in cloud computing

Alapati Naresh Salman Ali Syed  B.V.V.S. Prasad 

Vignan’s Nirula Institute of Technology and Science for Women, palakaluru, Guntur, Andhra Pradesh, India

Department of Computer Science, College of arts and Sciences, Al-Jouf University, Tabarjal, Kingdom of Saudi Arabia

Department of CSE, DRK institute of Science & Technology, Bowrampet, Hyderabad, India

Corresponding Author Email: 
alapatinaresh13@gmail.com
Page: 
201-212
|
DOI: 
https://doi.org/10.3166/ISI.23.5.201-212
Received: 
| |
Accepted: 
| | Citation

OPEN ACCESS

Abstract: 

Right now distributed computing assumes a fundamental job in various divisions. In spite of the fact that cloud is adaptable and savvy, it has a few testing issues to be tended to. A portion of the fundamental issues are cloud security and protection. The proposed fluffy based security instrument enhances the security level of information stockpiling in cloud by figuring cloud client's dependability relying upon their conduct. Reliability is assessed utilizing parameters that express client conduct, for example, number of bytes of information from specialist co-op to client, length of access to the cloud framework, timing of client visit, and IP address utilized by client for cloud get to. Cloud information is secured by encoding utilizing key produced dependent on trust level of clients and their successive access design. Visit get to design is identified by mining client's past conduct utilizing FP-Growth calculation. Investigation results demonstrate that the proposed plan withstands balckhole assault and offer higher bundle conveyance proportion.

Keywords: 

cloud computing, security, privacy, trust, fuzzy analysis, pattern mining

1. Introduction
2. Previous work
3. Proposed work
4. Experimental results
5. Conclusion & future work