Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 18
Page No. 3461 - 3473

Neuro Fuzzy ART Based User Behaviour Trust in Cloud Computing

Authors : M. Jaiganesh, S. Mercy, K.C. Anupama and A. Vincent Antony Kumar

References

Armbrust, M., A. Fox, R. Griffith, A.D. Joseph and R.H. Katz et al., 2009. Above the clouds: A Berkeley view of cloud computing. Technical Report No. UCB/EECS-2009-28, Department of Electrical Engineering and Computer Science, University of California, Berkeley, February 10, 2009. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.

Bendale, Y. and S. Shah, 2013. User level trust evaluation in cloud computing. Intl. J. Comput. Appl., 69: 31-35.
Direct Link  |  

Blume, M. and S.C. Esener, 1997. An efficient mapping of fuzzy ART onto a neural architecture. Neural Netw., 10: 409-411.
CrossRef  |  Direct Link  |  

Buyya, R., C.S. Yeo and S. Venugopal, 2008. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. Proceedings of the HPCC'08. 10th IEEE International Conference on High Performance Computing and Communications, September 25-27, 2008, IEEE, Dalian, China, ISBN: 978-0-7695-3352-0, pp: 5-13.

Carpenter, G.A., S. Grossberg and D.B. Rosen, 1991. Fuzzy ART: Fast stable learning and categorization of analog patterns by an adaptive resonance system. Neural Networks, 4: 759-771.
CrossRef  |  

Dutreilh, X., N. Rivierre, A. Moreau, J. Malenfant and I. Truck, 2010. From data center resource allocation to control theory and back. Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), July 5-10, 2010, IEEE, Miami, Florida, ISBN: 978-1-4244-8207-8, pp: 410-417.

Frank, T., K.F. Kraiss and T. Kuhlen, 1998. Comparative analysis of Fuzzy ART and ART-2A network clustering performance. IEEE Trans. Neural Networks, 9: 544-559.
CrossRef  |  Direct Link  |  

Habib, S.M., S. Ries, M. Muhlhauser and P. Varikkattu, 2014. Towards a trust management system for cloud computing marketplaces: Using caiq as a trust information source. Secur. Commun. Netw., 7: 2185-2200.
CrossRef  |  Direct Link  |  

Huang, J. and D.M. Nicol, 2013. Trust mechanisms for cloud computing. J. Cloud Comput., 2: 1-14.
CrossRef  |  Direct Link  |  

Huang, J., M. Georgiopoulos and G.L. Heileman, 1995. Fuzzy ART properties. Neural Netw., 8: 203-213.
CrossRef  |  Direct Link  |  

Ibrahim, L.M., 2010. Anomaly network intrusion detection system based on Distributed Time-Delay Neural Network (DTDNN). J. Eng. Sci. Technol., 5: 457-471.
Direct Link  |  

Iosup, A., S. Ostermann, M.N. Yigitbasi, R. Prodan, T. Fahringer and D.H. Epema, 2011. Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Trans. Parallel Distrib. Syst., 22: 931-945.
CrossRef  |  Direct Link  |  

Jaiganesh, M. and A.V.A. Kumar, 2012. JNLP Based Secure Software as a Service Implementation in Cloud Computing. In: Mathematical Modelling and Scientific Computation. Balasubramaniam, P. and R. Uthayakumar (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-642-28925-5, pp: 495-504.

Jaiganesh, M. and A.V.A. Kumar, 2013. B3: fuzzy-based data center load optimization in cloud computing. Math. Prob. Eng., Vol. 11,

Jaiganesh, M. and R. Sivasankari, 2012. ACDP: Prediction of application cloud data center proficiency using fuzzy modeling. Proc. Eng., 38: 3005-3018.
CrossRef  |  Direct Link  |  

Keskin, G.A., S. İlhan and C. Ozkan, 2010. The Fuzzy ART algorithm: A categorization method for supplier evaluation and selection. Expert Syst. Appli., 37: 1235-1240.
CrossRef  |  

Kuehnhausen, M., V.S. Frost and G.J. Minden, 2012. Framework for assessing the trustworthiness of cloud resources. Proceedings of the 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), March 6-8, 2012, IEEE, New Orleans, Louisiana, USA., ISBN: 978-1-4673-0343-9, pp: 142-145.

Lin, C.J. and C.T. Lin, 1997. An ART-based fuzzy adaptive learning control network. Fuzzy Syst. IEEE. Trans., 5: 477-496.
CrossRef  |  Direct Link  |  

Lombardi, F. and R. Di Pietrob, 2011. Secure virtualization for cloud computing. J. Network Comput. Appl., 34: 1113-1122.
CrossRef  |  

Luo, M., T. Peng and C. Leckie, 2008. CPU-based DoS attacks against SIP servers. Proceedings of the Symposium on Network Operations and Management Symposium (NOMS) 2008, April 7-11, 2008, IEEE, Salvador, Brazil, ISBN: 978-1-4244-2065-0, pp: 41-48.

Modi, C., D. Patel, B. Borisaniya, H. Patel and A. Patel et al., 2013. A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl., 36: 42-57.
CrossRef  |  Direct Link  |  

Ngamwitthayanon, N. and N. Wattanapongsakorn, 2011. Fuzzy-ART in network anomaly detection with feature-reduction dataset. Proceedings of the 2011 The 7th International Conference on Networked Computing (INC), September 26-28, 2011, IEEE, Gyeongsangbuk-do, South Korean Province, ISBN: 978-1-4577-1129-9, pp: 116-121.

Patel, A., M. Taghavi, K. Bakhtiyari and J.C. Junior, 2013. An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl., 36: 25-41.
CrossRef  |  Direct Link  |  

Rong, C., S.T. Nguyen and M.G. Jaatun, 2013. Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng., 39: 47-54.
CrossRef  |  Direct Link  |  

Scarfone, K.A., 2011. Guide to Security for Full Virtualization Technologies. DIANE Publishing, Collingdale, Pennsylvania, USA., Pages: 125.

Shea, R. and J. Liu, 2012. Understanding the impact of denial of service attacks on virtual machines. Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service, June 4-5, 2012, IEEE Press, Piscataway, New Jersey, USA., ISBN: 978-1-4673-1298-1, pp: 1-27.

Tian, L.Q., C. Lin and Y. Ni, 2010. Evaluation of user behavior trust in cloud computing. Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM), October 22-24, 2010, IEEE, Taiyuan, China, ISBN: 978-1-4244-7235-2, pp: V7567-V7572.

Wang, C., K. Ren and J. Wang, 2011. Secure and practical outsourcing of linear programming in cloud computing. Proceedings of the 2011 IEEE Conference on INFOCOM, April 10-15, 2011, IEEE, Shanghai, China, ISBN: 978-1-4244-9919-9, pp: 820-828.

Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of the 2010 IEEE Conference on INFOCOM, March 14-19, 2010, IEEE, San Diego, California, pp: 1-9.

Worku, S.G., C. Xu, J. Zhao and X. He, 2014. Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng., 40: 1703-1713.
CrossRef  |  Direct Link  |  

Xue, J., M. Li, W. Zhao and S.Y. Chen, 2012. Bound maxima as a traffic feature under DDOS flood attacks. Math. Prob. Eng. Vol. 20,

Zadeh, L.A., 1973. Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybernet., 3: 28-44.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved