Accurate detection of user interest data in cloud computing environment

被引:0
|
作者
Qiang Yu
Qi Liu
机构
[1] Xihua University,School of Computer and Software Engineering
来源
Cluster Computing | 2019年 / 22卷
关键词
Cloud computing environment; User interest; Data detection;
D O I
暂无
中图分类号
学科分类号
摘要
The accurate detection of user interest data in cloud computing environment can improve the quality of data management. For the accurate detection of user data, we need the adaptive train for the spatial data clustering process obtaining the data clustering objective function, and then complete the accurate detection of a characteristic data. This paper proposed the method of user interest data detection in cloud computing environment based on spatial autocorrelation and differential evolution theory. The method used spatial autocorrelation theory of neighborhood object to obtain the distance between outlier spatial data and its neighborhood spatial data, clustering all data for obtaining the data mean reference point, fitting the generated data mean reference point. The higher-order cumulant feature of data row was extracted. We used the differential evolution theory for the adaptive training on the clustering process of spatial data, the data clustering objective function was obtained. On this basis, we complete the user interest data detection. Experimental results show that the proposed method can accurately detect the user interest data in data space, and the false alarm rate of the proposed method is well below the traditional method. In the case of the same amount of data, the running time of the proposed method is lower than the traditional method. The proposed method has high detection accuracy and greatly improves the quality of data management in the cloud computing environment.
引用
收藏
页码:1169 / 1178
页数:9
相关论文
共 50 条
  • [1] Accurate detection of user interest data in cloud computing environment
    Yu, Qiang
    Liu, Qi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1169 - 1178
  • [2] Detection of Data Leakage in Cloud Computing Environment
    Kumar, Neeraj
    Katta, Vijay
    Mishra, Himanshu
    Garg, Hitendra
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 803 - 807
  • [3] A study on intrusion detection algorithms for user data cloud computing
    Li Y.
    International Journal of Simulation: Systems, Science and Technology, 2016, 17 (36): : 14.1 - 14.6
  • [4] User Interest Learning in Pervasive Computing Environment
    Dong, Yongquan
    Li, Qingzhong
    Yan, Zhongmin
    Pan, Peng
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 319 - 322
  • [5] Research on Intrusion Detection Algorithm of User Data based on Cloud Computing
    Zhang Hongdong
    Song Yuli
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 275 - 283
  • [6] Data Model for Cloud Computing Environment
    Akintoye, Samson B.
    Bagula, Antoine B.
    Isafiade, Omowumi E.
    Djemaiel, Yacine
    Boudriga, Noureddine
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, AFRICOMM 2018, 2019, 275 : 199 - 215
  • [7] Data integration in Cloud Computing environment
    De la Prieta, Fernando
    Rodriguez, Sara
    Bajo, Javier
    Lopez Batista, Vivian F.
    PROCEEDINGS OF THE FOURTH INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY, KNOWLEDGE MANAGEMENT AND DECISION SUPPORT (EUREKA-2013), 2013, 51 : 407 - 412
  • [8] Clustering Datasets in Cloud Computing Environment for User Identification
    Ali, Shallaw Mohammed
    Kecskemeti, Gabor
    30TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2022), 2022, : 165 - 171
  • [9] Research on abnormal data detection method of web browser in cloud computing environment
    Xindong Duan
    Cluster Computing, 2019, 22 : 1229 - 1238
  • [10] Research on abnormal data detection method of web browser in cloud computing environment
    Duan, Xindong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1229 - 1238