scispace - formally typeset
Search or ask a question

Showing papers by "Balamurugan Balusamy published in 2015"


Journal ArticleDOI
TL;DR: The paper provides an extensive survey of bio-inspired algorithms for solving and optimising problems related to resource scheduling, load balancing, file searching and security in cloud computing.
Abstract: Cloud computing provides internet-based services to access different kind of service or resources, eliminating the need for centralised data access. There are several challenges available in cloud computing, where specific issues like resource provisioning, load imbalance and performance improvement can be solved using bio-inspired algorithms. Bio-inspired algorithms have the tendency to solve various kinds of problems naturally by providing optimised solutions. Though it is not used in cloud computing to a greater extent, it is applicable in networking, pattern recognition, data mining, wireless sensor networks, etc. The adaptability influences the use of bio-inspired algorithms to solve the major issues in cloud computing. The paper provides an extensive survey of bio-inspired algorithms for solving and optimising problems related to resource scheduling, load balancing, file searching and security in cloud computing. The work compares the performance, response time and cost optimisation of each algorithm applicable for cloud computing environment.

18 citations


Journal ArticleDOI
TL;DR: This proposed work enhances the security of DAC-MAC during the user registration phase by the advent of digital signature over user credentials for avoiding man-in-the-middle attack and providing non-repudiation during userRegistration phase.
Abstract: In this information age, the amount of data generated by an individual and organisation is increasing exponentially Cloud computing has come as a rescue to store and compute the data efficiently at a low cost On the other hand, according to cloud security alliance, the threats and vulnerabilities related to cloud computing are on the rise and they may reach an uncontrollable level if cloud security inhabits the same shape Attribute-based encryption techniques are used in several critical applications for data access control Our proposed work enhances the security of DAC-MAC during the user registration phase by the advent of digital signature over user credentials for avoiding man-in-the-middle attack and providing non-repudiation during user registration phase Secondly, a verification scheme based on user-privilege list for file access request is included Lastly, by logging the user behaviours in the separate database table, the authenticity of the access node can be verified, monitored and DDoS attack can be nullified The framework could be used for IaaS application

11 citations


Book ChapterDOI
01 Jan 2015
TL;DR: The proposed scheme achieves data integrity and guarantees security to the data owners for their resource in the cloud to major extent through an extended framework that guarantees data integrity by involving data owner to perform auditing on the outsourced data in thecloud.
Abstract: Cloud computing is an evolving paradigm that has been resulted as an adoption of available technologies. Although cloud technology allows users to take more benefits from available infrastructures, and virtualization, which is an enabling technology provided by the cloud allows users to manage and use the resources in an efficient and easiest manner, it does not guarantee data integrity and security over the resources stored in the cloud. Though many security frameworks have been developed for the cloud, still there may be loss of data or loss of control over data uploaded into the cloud. And also, many solutions for data integrity by third-party auditor are available but they are semi-trustable, if third-party auditors (TPA) compromise unauthorized access over the resource in the cloud. Hence, our proposed scheme focuses on extended framework that guarantees data integrity by involving data owner to perform auditing on the outsourced data in the cloud. And so, our proposed scheme achieves data integrity and guarantees security to the data owners for their resource in the cloud to major extent. Therefore, this type of TPA approach creates awareness to the data owner of their resource and thereby guarantees data integrity for every resources stored in the cloud.

9 citations


Posted Content
TL;DR: A three-level text classifier is proposed with the first level as principal components analysis (PCA) followed by the support vector machine (SVM) and the conditional random fields (CRF) as the second and third level using the tweets collected.
Abstract: Big Data refers to the collection and storage of the enormous amount of data which is heterogeneous in nature. Data analysis is quite complex due to its enormous volume and its high generation speed. Big Data has many business applications such as in promotion, marketing either financially or by supporting in decision making. One such application is the sentiment analysis that paves the way for the business analysts to know the positive or negative impact over the product based on the tweets by the people. We propose a three-level text classifier with the first level as principal components analysis (PCA) followed by the support vector machine (SVM) and the conditional random fields (CRF) as the second and third level using the tweets collected. This feedback analyser would promote the sales of the product due to its high accuracy in feedback classification.

2 citations


Book ChapterDOI
01 Jan 2015
TL;DR: Whenever there is an alert of hackers/snoopers, the secret intelligent agent will be automatically generated to secure the data from malicious insider attacks using weighted undirected mathematical model.
Abstract: Cloud has proven to a cost-effective technology for computing and storage for IT industry. Cloud security has often referred as app security and used to solve the communication issues between the cloud user and the cloud. Cloud security technology will be more attentive. While transforming critical application into a cloud, there is a need for a privacy and security. Cloud technology has not yet compromised with the security especially malicious insider. This paper introduces a novel idea, an intelligent agent system, which is used for an automated security. Whenever there is an alert of hackers/snoopers, the secret intelligent agent will be automatically generated to secure the data from malicious insider attacks. This paper has validated using weighted undirected mathematical model.

2 citations