Improving Existing Data Security Standards in Cloud Computing Using Trust Based Machine Learning
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
The onset of the Big Data phenomenon, has brought to light the need to store and process data externally for effective and efficient computation. Cloud computing is a technology that has enabled individual users and organizations alike to implement such a functionality. Currently, a large percentage of the data being generated is stored on clouds and the number of organizations opting for cloud based technologies is constantly on the rise. With such growing numbers accessing and utilizing cloud resources, data security has become a major cause of concern. Traditional methods of cloud computing are becoming obsolete and ineffective with each technological breakthrough and data is thus highly subjected to getting corrupted or hacked. Machine Learning algorithms can be implemented to program the security mechanism such that the cloud is able to verify and secure the data with greater efficiency and improve the security predictions as more and more data gets accumulated. An AI (Artificial Intelligence) driven framework for cloud computing, can not only handle the current data traffic but is also a viable framework for the future as it learns and improves itself constantly as the accreted knowledge base increases. This paper implements Random Forest machine learning algorithm to improve the data security in cloud computing.
Authors and Affiliations
Aditya Chellam
Collaborative Filtering Approach of Keyword Aware Service Recommendation for Big Data Applications on Map-Reduce
Recommender systems are shown as valuable tools for providing acceptable recommendations to users. Within the last decade, the number of customers shopping online, services and on-line data has grown quickly, yielding t...
Enhanced Academic Performance Evaluation Technique Using Fuzzy System
In this paper, we have proposed fuzzy logic based enhanced academic performance evaluator system by increasing the number of attributes to achieve high degree of reliability and accuracy. In this paper we have added mor...
Review of MAC Protocol for WSN
In this paper with the widespread rapid development of computers and the wireless communication, the mobile computing becomes the field of computer communications in high profile link. In wireless networks, the data is...
Visualizing Website Clickstream Data with Apache Hadoop using Hortonworks
Nowadays most of the organizations have turned to Ecommerce which has become a necessary component for business strategy and a catalyst for economic development. These organizations need to predict the analysis about th...
Behavioural Comparison of Geometrically Different Steel Plate Shear Walls
Steel Plate Shear Walls (SPSWs) have been used as efficient and widely constructed primary lateral force resisting system particularly in areas of high seismic hazard in several modern and important structures. Signific...