2015 International Conference on Computing and Communications Technologies (ICCCT) 2015
DOI: 10.1109/iccct2.2015.7292782
|View full text |Cite
|
Sign up to set email alerts
|

A cluster based signature evaluation mechanism for protecting the user data in cloud environment through fuzzy ordering approach

Abstract: A Fuzzy set techniques which perhaps eliminate the several ambiguities on the particular issue to take right decision. Users may prefer the fuzzy approaches for their internal computation conflicts or manipulation to access boundless of data from cloud. Even though we have many security approaches, users are facing massive difficulties to safeguard their owning data in cloud environment. Protecting the confidential data from various hackers is the tedious problem in the current trend. So, possibly we will achi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…For instance, in [144], the authors used NoSQL for big data workflows execution to improve the scalability, parallelism and execution compared to traditional MapReduce framework. Hierarchical clustering [120], [130], [131] [121], [132] [122], [133], [134] [123]…”
Section: Nosqlmentioning
confidence: 99%
“…For instance, in [144], the authors used NoSQL for big data workflows execution to improve the scalability, parallelism and execution compared to traditional MapReduce framework. Hierarchical clustering [120], [130], [131] [121], [132] [122], [133], [134] [123]…”
Section: Nosqlmentioning
confidence: 99%