A Fuzzy Model for Selection of Information and Location-Based Security Attributes in Cloud Environment<bold> </bold>

被引:0
|
作者
Deepika [1 ,2 ]
Kumar, Rajneesh [1 ]
Dalip [3 ]
机构
[1] MM Deemed Univ, MM Engn Coll, Mullana, Ambala, India
[2] Chandigarh Univ, UIE CSE, Mohali, India
[3] MM Deemed Univ, MMICTBM, Mullana, Ambala, India
关键词
Security attacks (SA); Security principles; Information security attributes (ISA); Location security attributes (LSA); Fuzzy weight<bold>; </bold>; CHALLENGES; ISSUES;
D O I
10.1007/978-981-16-8721-1_49
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security is a prime concern in cloud computing-based environment in which user accesses resources remotely and pays on used bases. Nowadays, the information and location-based security is one of the most important issues to access these cloud resources. This paper proposed a fuzzy model for assigning weights to information and location-based security attributes (FMAW-ILSA). This model is used to assign an experienced-based fuzzy weight to security attacks attributes, information and location-based security attributes. The assigned weight helps in selection of information and location-based security attributes. The criteria for assigning the weights depend on the attribute frequencies. The motive behind this paper is to select the information and location-based security attributes which are less utilized in the existingwork such as information security (IS), data location and relocation (DLRL), phishing attack (PA), location tracking (LT) and location and control of data (LCD). The developed fuzzy model helps the researchers for better decision making in order to select information and location-based security attributes for future research to more enhance the cloud security.<bold> </bold>
引用
收藏
页码:507 / 515
页数:9
相关论文
共 50 条
  • [1] Location-Based Security Framework for Cloud Perimeters
    Jaiswal, Chetan
    Nath, Mahesh
    Kumar, Vijay
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (03): : 56 - 64
  • [2] Enabling Location-based Policies in a Healthcare Cloud Computing Environment
    Zickau, Sebastian
    Thatmann, Dirk
    Ermakova, Tatiana
    Repschlaeger, Jonas
    Zarnekow, Ruediger
    Kuepper, Axel
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 333 - 338
  • [3] Selection of Cloud Security by Employing MABAC Technique in the Environment of Hesitant Bipolar Complex Fuzzy Information
    Waqas, Hafiz Muhammad
    Emam, Walid
    Mahmood, Tahir
    Rehman, Ubaid Ur
    Yin, Shi
    [J]. IEEE ACCESS, 2024, 12 : 123127 - 123148
  • [4] <bold>Efficient multimedia information mining framework based on deep learning and self-organizing model</bold>
    Mai, Xiaodong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (04) : 4605 - 4622
  • [5] A Fuzzy Based Trust Evaluation Model for Service Selection in Cloud Environment
    Priya, G.
    Jaisankar, N.
    [J]. INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2019, 11 (04) : 13 - 27
  • [6] A location-based interactive model for Internet of Things and Cloud (IoT-cloud)
    Thanh Dinh
    Kim, Younghan
    Lee, Hyukjoon
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 444 - 447
  • [7] A QoS Constraints Location-based Services Selection Model and Algorithm under Mobile Internet Environment
    Xin, Mingjun
    Jiang, Tianle
    Zhang, Rui
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (02): : 127 - 138
  • [8] A Location-based Services Selection Model and Algorithm with QoS Constraints under Mobile Internet Environment
    Xin, Mingjun
    Lu, Manli
    Zhang, Rui
    [J]. PROCEEDINGS 2014 INTERNATIONAL CONFERENCE ON SERVICE SCIENCES (ICSS 2014), 2014, : 124 - 129
  • [9] Mobile cloud computing based privacy protection in location-based information survey applications
    Zhang, Hao
    Yu, Nenghai
    Wen, Yonggang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1006 - 1025
  • [10] Location-based security framework for use of handheld devices in medical information systems
    Hansen, F
    Oleshchuk, V
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 565 - +