2017
DOI: 10.2991/ijcis.2017.10.1.34
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Fuzzy Self-Classifying Clustering based Framework for Cloud Security

Abstract: Though cloud computing has become an attractive technology due to its openness and services, it brings several security hazards towards cloud storage. Since the distributed nature of clouds is achieved through internetworking technologies, clouds suffer from all the vulnerabilities by which networking also suffers. In essence, data stored in clouds are vulnerable to attacks from intruders. But, no single technique can provide efficient intrusion detection. In this paper, we propose fuzzy self-classifying clust… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…At present, the computer audit technology in data acquisition, data conversion, data processing, and data analysis has been a breakthrough function in software in the following aspects: risk assessment, audit plan, paper review, fraud check/prevention and supervision, audit schedule, audit papers, audit report, project management, and problem tracking [5,6]. Domestic research on cloud audit of social security funds started late and is still in the exploratory stage.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At present, the computer audit technology in data acquisition, data conversion, data processing, and data analysis has been a breakthrough function in software in the following aspects: risk assessment, audit plan, paper review, fraud check/prevention and supervision, audit schedule, audit papers, audit report, project management, and problem tracking [5,6]. Domestic research on cloud audit of social security funds started late and is still in the exploratory stage.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the fuzzy logic operation of neural network, the Sigmoid function is selected, and the membership function is realized by neural network. 6 Complexity…”
Section: Calculation Of Fuzzy Membership Degreementioning
confidence: 99%
“…In the following, k denotes the iteration-best agent; L k is the length of the tour performed by the agent k. The iteration-best agent update of pheromones is indicated in Eqs. (7) and (8):…”
Section: Measuring the Intelligence Increase Of A Learning Cooperativmentioning
confidence: 99%
“…Intelligent systems have been successfully applied for the solution of a variety of difficult practical problems, such as medical diagnosis [1][2][3][4][5][6], intrusion detection [7], network traffic anomalies detection [8], multisensor battlefield reconnaissance simulation [9], local semantic indexing for resource discovery on overlay networks [10], distributed reasoning for context-aware service [11] and real-time water demand management [12]. Given a problem, its solving difficulty can be considered from different viewpoints, for example, from the human and the computational viewpoint.…”
Section: Introductionmentioning
confidence: 99%
“…It is urgently needed to detect network intrusions and curb these attacks. The essence of intrusion detection is to quickly detect the intrusion behaviors from a large amount of data, and provide the response mechanism of the solutions to these intrusions [1]. To date, many different techniques have been introduced to improve the detection of network intrusions.…”
Section: Introductionmentioning
confidence: 99%