CFP last date
20 May 2024
Reseach Article

Cluster based Efficient AAA Security for Cloud Computing

by Nisha Bawaria, Priyanka Mandrai, Pankaj Richhariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 15
Year of Publication: 2016
Authors: Nisha Bawaria, Priyanka Mandrai, Pankaj Richhariya
10.5120/ijca2016910927

Nisha Bawaria, Priyanka Mandrai, Pankaj Richhariya . Cluster based Efficient AAA Security for Cloud Computing. International Journal of Computer Applications. 146, 15 ( Jul 2016), 47-50. DOI=10.5120/ijca2016910927

@article{ 10.5120/ijca2016910927,
author = { Nisha Bawaria, Priyanka Mandrai, Pankaj Richhariya },
title = { Cluster based Efficient AAA Security for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 15 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 47-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number15/25496-2016910927/ },
doi = { 10.5120/ijca2016910927 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:37.281388+05:30
%A Nisha Bawaria
%A Priyanka Mandrai
%A Pankaj Richhariya
%T Cluster based Efficient AAA Security for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 15
%P 47-50
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

in internet and text documents tons of vital information is available. This side-information is available in documents as beginning information, the links within the documents, user-access behavior from internet logs, or different non-textual characteristics which are embedded into the text document. This side information is employed in document clustering of such documents bunch. This information can embody noisy information as well; therefore it's tough to use it with efficiency. Thus correct algorithms are needed to use such information in document clustering to avoid noise from the extracted clusters. We'd like a properly dominated ways to perform the mining method to optimize the benefits got from mistreatment of this side information. In this work, we are improving the planning of AAA algorithm to accommodate high security and efficiency of the system.

References
  1. Sah, S.K.; Shakya, S.; Dhungana, H., "A security management for Cloud based applications and services with Diameter-AAA," Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on , vol., no., pp.6,11, 7-8 Feb. 2014 doi: 10.1109/ICICICT.2014.6781243
  2. Sinha, N.; Khreisat, L., "Cloud computing security, data, and performance issues," Wireless and Optical Communication Conference (WOCC), 2014 23rd , vol., no., pp.1,6, 9-10 May 2014 doi: 10.1109/WOCC.2014.6839924
  3. Dinadayalan, P.; Jegadeeswari, S.; Gnanambigai, D., "Data Security Issues in Cloud Environment and Solutions," Computing and Communication Technologies (WCCCT), 2014 World Congress on , vol., no., pp.88,91, Feb. 27 2014-March 1 2014 doi: 10.1109/WCCCT.2014.63
  4. Bohli, J.-M.; Gruschka, N.; Jensen, M.; Iacono, L.L.; Marnau, N., "Security and Privacy-Enhancing Multicloud Architectures," Dependable and Secure Computing, IEEE Transactions on , vol.10, no.4, pp.212,224, July-Aug. 2013 doi: 10.1109/TDSC.2013.6
  5. Datta, E.; Goyal, N., "Security attack mitigation framework for the cloud," Reliability and Maintainability Symposium (RAMS), 2014 Annual , vol., no., pp.1,6, 27-30 Jan. 2014 doi: 10.1109/RAMS.2014.6798457
  6. Peter Mell and Tim Grance, "Effectively and Securely Using the Cloud Computing Paradigm",National Institute of Standards and Technology (NIST) Information Technology Laboratory, October, 2009.
  7. P. B. Maxine Singer, Genes & Genomes: a Changing Per-spective. University Science Books, Mill Valley, CA, 1991.
  8. Raj Kumar Buyya, James Broberg and Andrzej Goscinski, "Cloud Computing Principles and Paradigms", A JOHN WILEY & SONS, INC., PUBLICATION 2011.
  9. P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, "Diameter Base Protocol," RFC 3588 (Proposed Standard), Sep. 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Web Data Mining Clustering Data mining AAA Algorithm Security Cloud Computing and Hierarchical Model