DATA STORING AND RETRIEVAL METHOD IN BIG DATA USING FUZZY BASED SCALABLE CLUSTERING ALGORITHMS
DOI:
https://doi.org/10.29121/ijetmr.v6.i6.2019.389Keywords:
Data Storage, Big Data, Fuzzy Logic, Clustering, Rds-FlaAbstract
A massive volume of digital data holding valuable information, called Big Data, is produced each generation. To process and excavate such valuable information, clustering is commonly used as a data investigation technique. A huge amount of Big Data diagnostics contexts have been established to measure the clustering procedures used for big data analysis. There exists one and only framework called Fuzzy based mechanism which actually fits in for iterative method by associate in storage divisions and accessible. The proposed algorithm is motivated towards the design and implementation of fuzzy based clustering algorithms on big data, which could be present for clustering huge datasets due to their low computational necessities. In this paper, we propose Random Data Storing with Optimization Fuzzy Logic algorithm (RDS-FLA) applied on cluster data to handle the tasks that are connected with big data clustering. Experimental trainings data taking place several big datasets have been showed. The performance of RDS-FLA is tried in evaluation with the proposed scalable form of the temporal fuzzy and Random data storing that is implemented on the big data cluster. The computation outcomes are recounted in terms of time and space complexity, run time and measure of clustering quality, showing that RDS-FLA is able to run in much less time without compromising the clustering quality. Thus, the algorithm proposed alleviates the processing time and increases the security of storage data effectively. Advantages such as cost optimization and efficiency in data security can be identified from the experimental results of proposed algorithm.
Downloads
References
Jia Yu, KuiRen, Cong Wang and Vijay Varadharajan, “Enabling Cloud Storage Auditing With Key-Exposure Resistance”, IEEE Transactions on Information Forensics and Security, 10, 2015, 1167 – 1179. DOI: https://doi.org/10.1109/TIFS.2015.2400425
Kan Yang, XiaohuaJia, Expressive, Efficient and Revocable Data Access Control for MultiAuthority Cloud Storage, IEEE Transactions in Parallel and Distributed Systems, 25, 2014, 1735 – 1745. DOI: https://doi.org/10.1109/TPDS.2013.253
Poornashree B R, S Srividhya “A Survey on Provable Data Possession in Cloud Computing Systems,” International Journal of Engineering Research & Technology, 5, 2016,707 – 709.. DOI: https://doi.org/10.17577/IJERTV5IS031055
Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, and Yang Xiang, "Two-Factor Data Security Protection Mechanism for Cloud Storage System", IEEE Transactions on Computers, 65, 2016, 1992 – 2004. DOI: https://doi.org/10.1109/TC.2015.2462840
Muthurajkumar, S, Vijayalakshmi, M., and Kannan, A., Secured Temporal Log Management Techniques for Cloud, Procedia Computer Science, 46, 2015, 589 – 595. DOI: https://doi.org/10.1016/j.procs.2015.02.098
Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P. and Kannan, A., Intelligent feature selection and classification techniques for intrusion detection in networks: a survey, EURASIP-Journal of Wireless Communications and Networking – Springer Open Journal. 271: 2013, 2013, 1 – 16.
Aparna, K. S. M. V Kumar, "Privacy Preserving and Authorized Data Deduplication in Public Cloud Framework”, International Journal of Advanced Research in Computer Science and Software Engineering, 5, 2015, 772 – 775.
Wenjing Lou, KuiRen , Qian Wang , Sherman S.M. Chow , Cong Wang, "Privacy-Preserving Public Auditing for Secure Cloud Storage" in IEEE Transactions on Computer, 62, 2013, 362 – 375. DOI: https://doi.org/10.1109/TC.2011.245
Hong Liu, HuanshenNing, QingxuXiong, Luarence T. Yang, "Shared Authority Based PrivacyPreserving Authentication Protocol in Cloud Computing" in IEEE Transactions on Parallel and Distributed Systems, 26, 2015, 241 – 251. DOI: https://doi.org/10.1109/TPDS.2014.2308218
Jia Yu, KuiRen, Cong Wang, "Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates" in IEEE Transactions on Information Forensics and Security, 11, 2016, 1362 - 1375. DOI: https://doi.org/10.1109/TIFS.2016.2528500
SwapnaliMorea, SangitaChaudhari, "Third Party Public Auditing scheme for Cloud Storage", in 7th International Conference on Communication, Computing and Virtualization 2016. DOI: https://doi.org/10.1016/j.procs.2016.03.010
Luca Ferreti, Michele Colajanni, MircoMarchetti, “Distributed, Concurrent and Independent Access to Encrypted Cloud Databases,” IEEE Transactions in Parallel and Distributed Systems, 25, 2014, pp. 437 -446. DOI: https://doi.org/10.1109/TPDS.2013.154
Muthurajkumar, S., Vijayalakshmi, M. &Kannan, A. “Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases”, Wireless PersCommun (2017). doi:10.1007/s11277-017-4437-3. DOI: https://doi.org/10.1007/s11277-017-4437-3
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proceeding Network and Distributed Systems Security Symposium (NDSS), 2005, 29-43.
R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proceeding ACM Symposium Information, Computer and Comm. Security, 2010, 282-292. DOI: https://doi.org/10.1145/1755688.1755723
B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” Proc. Int’l Conference Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, http://eprint.iacr.org/2008/290.pdf, 2008.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proceeding ACM Conference Computer and Comm. Security (CCS), 2006, 89-98. DOI: https://doi.org/10.1145/1180405.1180418
Zhongma Zhu, Rui Jiang, “A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud”, IEEE Transactions on Parallel and Distributed Systems, 2015, 130-146.
S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proceeding International Conference Financial Cryptography and Data Security (FC), 2010, 136-149. DOI: https://doi.org/10.1007/978-3-642-14992-4_13
Downloads
Published
How to Cite
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section