Fuzzy ART-Based User Behavior Trust in Cloud Computing

  • M. Jaiganesh
  • M. Aarthi
  • A. Vincent Antony Kumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)


Nowadays, cloud has evolving rapidly for more scientific applications and communication across millions of people. It shares the resources which are available on-demand to the user as they needed. The virtual machines which resides the cloud resources can be shared by entire cloud environment and can easily be prone to attacks and threats. In this growing concern, ensuring the trust of virtual machines plays a major role in cloud computing environment. One of the most important evolving concerns is that the virtual client’s perspective data or resources are hacked by the attackers easily. To overcome this behavior, we proposed a fuzzy logic technique called Fuzzy ART, where the consumption of resources is periodically scanned. Based on the traced-out behaviors, the virtual machine states are classified into categories from stable to attackers. The benefit of the proposed technique is an unsupervised learning.


Cloud computing Fuzzy ART Unsupervised learning Random access memory 


  1. 1.
    K. Scarfone, M. Souppaya, P. Hoffman, Guide to Security for Full Virtualization Technologies. NIST, US Department of Commerce, Special Publication, pp. 125–800Google Scholar
  2. 2.
    M. Armbrust, A. Fox, R. Griffth, Above the Clouds: A Berkeley View of Cloud Computing Google Scholar
  3. 3.
    M. Jaiganesh, A.V. Antony Kumar, B3: fuzzy based data center load optimization in cloud computing. Math. Probl. Eng. 1, 1–11 (2013)CrossRefGoogle Scholar
  4. 4.
    J. Huang, M. Georgiopoulos, G.L. Heileman, Fuzzy ART properties. Neural Netw. 8(2), 203–213 (1995)CrossRefGoogle Scholar
  5. 5.
    M. Kuehnhausen, V.S. Frost Gary, J. Minden, Framework for assessing the trustworthiness of cloud resources, in Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, pp. 142–145 (2012)Google Scholar
  6. 6.
    M. Jaiganesh, A.V. Antony Kumar, B. Ramadoss, Hypervisor hardware fuzzy trust monitor in cloud computing, in Elsevier Proceedings of the Eighth International Conference on Communication Networks, pp. 11–19 (2013)Google Scholar
  7. 7.
    G.A. Carpenter, S. Grossberg, D.B. Rosen, Fuzzy ART: Fast stable learning and categorization of analog patterns by an adaptive resonance system. Neural Netw. 4(6), 759–771 (1991)CrossRefGoogle Scholar
  8. 8.
    G. Aydzn Keskin, S. Ilhan, C. Zkan, The fuzzy ART algorithm: a categorization method for supplier evaluation and selection. Expert Syst. Appl. 37(2), 1235–1240 (2010)CrossRefGoogle Scholar
  9. 9.
    C.-J. Lin, C.-T. Lin, An ART-based fuzzy adaptive learning control network. IEEE Trans. Fuzzy Syst. 5(4), 477–496 (1997)CrossRefGoogle Scholar
  10. 10.
    J. Huang, D.M. Nicol, Trust mechanisms for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 2(9), 1–14 (2013)Google Scholar
  11. 11.
    M. Nelson, C. Charles, Fernando, F. Marcos, A. Tereza, M. Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(11), 1–21 (2012)Google Scholar
  12. 12.
    M. Jaiganesh, A.V. Antony Kumar, JNLP based secure software as a service in cloud computing, in Proceedings of the International Conference on Mathematical Modeling and Scientific Computations (ICMMSC’12)—Communications in Computer and Information Science, Springer-Verlag, Berlin, pp. 495–504 (2012)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • M. Jaiganesh
    • 1
  • M. Aarthi
    • 1
  • A. Vincent Antony Kumar
    • 1
  1. 1.Department of Information TechnologyPSNA College of Engineering and TechnologyDindigulIndia

Personalised recommendations