DocumentCode :
3668390
Title :
A cluster based signature evaluation mechanism for protecting the user data in cloud environment through fuzzy ordering approach
Author :
R. Poorvadevi;S. Rajalakshmi
Author_Institution :
(CSE), SCSVMV University, Kanchipuram, Tamilnadu, India
fYear :
2015
Firstpage :
392
Lastpage :
397
Abstract :
A Fuzzy set techniques which perhaps eliminate the several ambiguities on the particular issue to take right decision. Users may prefer the fuzzy approaches for their internal computation conflicts or manipulation to access boundless of data from cloud. Even though we have many security approaches, users are facing massive difficulties to safeguard their owning data in cloud environment. Protecting the confidential data from various hackers is the tedious problem in the current trend. So, possibly we will achieve the efficient security outcome by applying the different set of security principles. This proposed model is well suitable for securing the user confidential information´s from the attackers in any situation. It focuses on clustering the different sort of input factors of customer validation attributes and evaluates these attributes to ensure the authenticity of unique users in cloud environment by ranking the distinguished threshold levels to prove user authentication function.
Keywords :
"Image segmentation","Authentication","Computational modeling","Clustering algorithms","Data models","Communications technology"
Publisher :
ieee
Conference_Titel :
Computing and Communications Technologies (ICCCT), 2015 International Conference on
Type :
conf
DOI :
10.1109/ICCCT2.2015.7292782
Filename :
7292782
Link To Document :
بازگشت