Improving Existing Data Security Standards in Cloud Computing Using Trust Based Machine Learning
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
The onset of the Big Data phenomenon, has brought to light the need to store and process data externally for effective and efficient computation. Cloud computing is a technology that has enabled individual users and organizations alike to implement such a functionality. Currently, a large percentage of the data being generated is stored on clouds and the number of organizations opting for cloud based technologies is constantly on the rise. With such growing numbers accessing and utilizing cloud resources, data security has become a major cause of concern. Traditional methods of cloud computing are becoming obsolete and ineffective with each technological breakthrough and data is thus highly subjected to getting corrupted or hacked. Machine Learning algorithms can be implemented to program the security mechanism such that the cloud is able to verify and secure the data with greater efficiency and improve the security predictions as more and more data gets accumulated. An AI (Artificial Intelligence) driven framework for cloud computing, can not only handle the current data traffic but is also a viable framework for the future as it learns and improves itself constantly as the accreted knowledge base increases. This paper implements Random Forest machine learning algorithm to improve the data security in cloud computing.
Authors and Affiliations
Aditya Chellam
Enhancement of Heat Transfer in Shell and Tube Heat Exchanger Using MGO Nano Fluid
Heat exchangers are most widely used devices for industrial purposes. Because there is a lot of need for cooling as well as to dissipate heat. So, here in this paper we aim at rapid cooling and high heat dissipation. Fo...
Relating Infiltration Capacity with Soil Properties
In the present scenario, Water crisis has become a major problem Infiltration is one of the major components of the hydrologic cycle, replenishes the ground water. The ability to quantify infiltration is of great import...
Deduplicating Data in Cloud and Secure Auditing
As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. N...
Exploring the Hidden Content from Video Using Data Encryption Standard (DES) Algorithm
The rapid development of data transfer through internet made it easier to send data accurate and faster to destination. There are many transmission media like e-mail, chart etc., at the same time it may be easier to mod...
Mathematical Based Model on Survivability for WDM Networks
Survivability is a new field of research, and is viewed by many as distinct from the traditional areas of security and fault-tolerance. Survivability is the ability of any system to continuously withstand its adequate p...