Authors: Annaluri Sreenivasa Rao; Attili Venkat Ramana; Somula Ramasubbareddy
Addresses: Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, Telangana 500090, India ' Department of Electronics and Computer Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, Telangana 501301, India ' Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, Telangana 500090, India
Abstract: To deal with large scale computing events, the advantages of cloud computing are used extensively, whereby the possibility of machines processing larger data is possible to deliver in a scalable manner. However, one cannot ignore the challenges involved using the technology linked with large amount of data and internet applications (i.e., cloud). One of the biggest challenges cloud computing faces is security breaching and related issues. In this paper, an extensive mitigation system is proposed to achieve enhanced security and safer environment while using the applications of cloud computing. Using the decision tree model Chaid algorithm, it is proved to be a robust technique to classify and decision making by providing high end security for the cloud services. In this paper, it is proved that the standards, controls and policies are very important to the management processes for securing and protecting the data involved at the time of processing.
Keywords: cloud computing; security; data mining; multilayer percepton; decision tree; C4.5; partial tree.
International Journal of Cloud Computing, 2022 Vol.11 No.1, pp.27 - 42
Received: 03 Jun 2019
Accepted: 01 Oct 2019
Published online: 18 Feb 2022 *