• S. Muthuraj Kumar Department of Computer Technology, Madras Institute of Technology (MIT) Campus, Anna University, Chrompet, Chennai - 600044, India
Keywords: Data Storage, Big Data, Fuzzy Logic, Clustering, Rds-Fla


A massive volume of digital data holding valuable information, called Big Data, is produced each generation. To process and excavate such valuable information, clustering is commonly used as a data investigation technique. A huge amount of Big Data diagnostics contexts have been established to measure the clustering procedures used for big data analysis. There exists one and only framework called Fuzzy based mechanism which actually fits in for iterative method by associate in storage divisions and accessible. The proposed algorithm is motivated towards the design and implementation of fuzzy based clustering algorithms on big data, which could be present for clustering huge datasets due to their low computational necessities. In this paper, we propose Random Data Storing with Optimization Fuzzy Logic algorithm (RDS-FLA) applied on cluster data to handle the tasks that are connected with big data clustering. Experimental trainings data taking place several big datasets have been showed. The performance of RDS-FLA is tried in evaluation with the proposed scalable form of the temporal fuzzy and Random data storing that is implemented on the big data cluster. The computation outcomes are recounted in terms of time and space complexity, run time and measure of clustering quality, showing that RDS-FLA is able to run in much less time without compromising the clustering quality. Thus, the algorithm proposed alleviates the processing time and increases the security of storage data effectively. Advantages such as cost optimization and efficiency in data security can be identified from the experimental results of proposed algorithm.


Download data is not yet available.


Jia Yu, KuiRen, Cong Wang and Vijay Varadharajan, “Enabling Cloud Storage Auditing With Key-Exposure Resistance”, IEEE Transactions on Information Forensics and Security, 10, 2015, 1167 – 1179. DOI:

Kan Yang, XiaohuaJia, Expressive, Efficient and Revocable Data Access Control for MultiAuthority Cloud Storage, IEEE Transactions in Parallel and Distributed Systems, 25, 2014, 1735 – 1745. DOI:

Poornashree B R, S Srividhya “A Survey on Provable Data Possession in Cloud Computing Systems,” International Journal of Engineering Research & Technology, 5, 2016,707 – 709.. DOI:

Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, and Yang Xiang, "Two-Factor Data Security Protection Mechanism for Cloud Storage System", IEEE Transactions on Computers, 65, 2016, 1992 – 2004. DOI:

Muthurajkumar, S, Vijayalakshmi, M., and Kannan, A., Secured Temporal Log Management Techniques for Cloud, Procedia Computer Science, 46, 2015, 589 – 595. DOI:

Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P. and Kannan, A., Intelligent feature selection and classification techniques for intrusion detection in networks: a survey, EURASIP-Journal of Wireless Communications and Networking – Springer Open Journal. 271: 2013, 2013, 1 – 16.

Aparna, K. S. M. V Kumar, "Privacy Preserving and Authorized Data Deduplication in Public Cloud Framework”, International Journal of Advanced Research in Computer Science and Software Engineering, 5, 2015, 772 – 775.

Wenjing Lou, KuiRen , Qian Wang , Sherman S.M. Chow , Cong Wang, "Privacy-Preserving Public Auditing for Secure Cloud Storage" in IEEE Transactions on Computer, 62, 2013, 362 – 375. DOI:

Hong Liu, HuanshenNing, QingxuXiong, Luarence T. Yang, "Shared Authority Based PrivacyPreserving Authentication Protocol in Cloud Computing" in IEEE Transactions on Parallel and Distributed Systems, 26, 2015, 241 – 251. DOI:

Jia Yu, KuiRen, Cong Wang, "Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates" in IEEE Transactions on Information Forensics and Security, 11, 2016, 1362 - 1375. DOI:

SwapnaliMorea, SangitaChaudhari, "Third Party Public Auditing scheme for Cloud Storage", in 7th International Conference on Communication, Computing and Virtualization 2016. DOI:

Luca Ferreti, Michele Colajanni, MircoMarchetti, “Distributed, Concurrent and Independent Access to Encrypted Cloud Databases,” IEEE Transactions in Parallel and Distributed Systems, 25, 2014, pp. 437 -446. DOI:

Muthurajkumar, S., Vijayalakshmi, M. &Kannan, A. “Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases”, Wireless PersCommun (2017). doi:10.1007/s11277-017-4437-3. DOI:

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proceeding Network and Distributed Systems Security Symposium (NDSS), 2005, 29-43.

R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proceeding ACM Symposium Information, Computer and Comm. Security, 2010, 282-292. DOI:

B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” Proc. Int’l Conference Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography,, 2008.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proceeding ACM Conference Computer and Comm. Security (CCS), 2006, 89-98. DOI:

Zhongma Zhu, Rui Jiang, “A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud”, IEEE Transactions on Parallel and Distributed Systems, 2015, 130-146.

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proceeding International Conference Financial Cryptography and Data Security (FC), 2010, 136-149. DOI:

How to Cite
Kumar, S. (2019). DATA STORING AND RETRIEVAL METHOD IN BIG DATA USING FUZZY BASED SCALABLE CLUSTERING ALGORITHMS . International Journal of Engineering Technologies and Management Research, 6(6), 9-17.