Contents & References of A fuzzy k-nearest neighbor data classification algorithm for privacy in cloud computing
List:
Abstract: 1
Chapter One: Introduction. 2
1-1 Introduction. 2
1-2 Defining the problem and stating the main research questions. 3
1-3 background and necessity of research. 4
1-4 objectives 8
1-5 aspects of research innovation: 9
1-6 stages of research. 9
1-7 thesis structure. 9
Chapter Two: General topics of cloud processing, security and simulation. 10
2-1 Introduction. 10
2-2 A brief history of cloud computing. 11
2-3 The current state of cloud computing. 12
2-4 characteristics of cloud computing. 13
2-4-1 key feature of cloud computing. 17
2-4-2 The main advantages of cloud computing. 18
2-4-3 possible tasks in cloud computing. 18
2-5 cloud computing architecture. 19
2-6 Security and challenges of cloud computing. 21
2-7 Security in cloud computing. 22
2-8 Weaknesses of cloud computing. 22
2-8-1 The need for a permanent Internet connection. 22
2-8-2 not working with low speed internet. 23
2-8-3 Privacy. 23
2-9 security disadvantages in cloud environments. 23
2-9-1 Data location 24
2-9-2 Data separation 24
2-10 Data security 24
2-10-1 Control and access. 25
2-10-2 Encryption. 25
2-11 Introduction to simulation. 26
2-12 Some computer network simulation software. 28
2-13 Getting to know Cloudsim tool. 29
2-13-1 Clodsim architecture. 30
2-14 virtual machine allocation models. 31
2-15 classes available in Cloudsim. 32
2-16 Summary. 35
Chapter three: Review of the past works of encryption algorithms. 37
3-1 Introduction. 37
2-3 Introduction of the method. 38
3-3 past work records. 39
3-4 Objectives of the method. 41
3-5 data classification 42
3-5-1 machine learning. 42
3-6 Definition of sensitive and non-sensitive data. 46
3-7 classifier-Knearest neighbor. 48
3-8 encryption with RSA method. 49
9-3 Cryptography. 49
3-9-1 Encryption algorithms. 50
3-10 Arasai. 52
3-10-1 RSA algorithm steps. 51
3-11 Advanced Cryptography Standard. 54
3-11-1 Description of cryptography. 55
3-12 Summary. 56
Chapter four: Introduction of the proposed method. 57
4-1 Introduction. 57
4-2 Introduction of the new fuzzy K-nearest neighbor method for data classification in cloud computing. 58
1-4-2 Theory of fuzzy sets. 58
4-3 Differences in the results of classification algorithms. 58
4-4 framework used 59
4-5 proposed method. 59
4-5-1 Training data and test data. 61
4-5-2 Saving in the cloud. 62
4-5-3 working method of KNN algorithm. 62
4-5-4 working method of F-KNN algorithm. 64
6-4 Summary. 66
Chapter Five: Tests and evaluation of results. 67
5-1 Introduction. 67
5-2 Test data location and Vajra implementation environment 68
5-3 Comparison of the results obtained from K-nearest normal and fuzzy neighbor algorithm 72
5-4 characteristics of the software layer as a service. 76
5-5 Features of the Platform-as-a-Service layer for virtual management. 77
5-6 Properties of the infrastructure-as-a-service layer in cloud simulation. 78
5-7 identification rate. 79
5-8 simulation results. 80
5-9 simulation time of work steps. 81
5-10 summary. 83
Chapter Six: Conclusion and Suggestions 84
6-1 Introduction. 84
6-2 The results of the research. 84
6-3 suggestions 85
References: 86
English dictionary. 89
English abstract.93
Source:
Pakize R, "Simulation of cloud computing". Pardis Danesh Publications, Tehran, (2013). Hosseinpour Fazalahi S., "Machine Learning", Master's Thesis, Faculty of Computer Engineering, Tabriz University, (2013). Khushkwan M., "An Introduction to Number Theory", Khushkwan Publications, Tehran, (2011). Latfis, Fakhri P., "Cloud Computing". Parse Publications, Tehran, (1392).S, Brobergh. S, and Brandic. I "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility", Vol.2518, (2012).
Cachin.C, and Haas.R, "Dependable Storage in the Intercloud", IBM Research Report RZ, Vol.3783, (2010). Hogben.G, "Cloud Computing: Benefits, risks and recommendations for information security", ENISA, pp 147-152, (2009).
Chang .Y, and Liu .H, "Semi-supervised classification algorithm based on the KNN", Conf. on Communication Software and Networks (ICCSN).pp 9-12, (2011).
Nosing around the neighborhood: A new system structure and classification rule in partially exposed environments", IEEE Trans. PAMI-2, (2008).
] Gong.k, Zhang.Q, and Gong. Zh computing", 39th International Conference on Parallel Processing Workshops, 2010.
Gorgen.D,"Future Generation Computer Systems", Vol.25 (6), pp.599-616. (2009).
Hathaway .L, "National Policy on the use of the advanced encryption standard (AES) to protect national security systems and national security information", 2003-02-15, Retrieved June. (2011).
Hunt. E," Artificial Intelligence Federal Information Processing Standards Publication", New York Academic, November 26, 2001, Retired October 2, (2002).
Ian. F, Yong. Z, Loan .R, Shiyong. L. "Cloud computing and grid computing 360-Degree compared". IEEExplore Austin (TX), 06 January, (2009).
James.J, Keller.M, Michael.R. Gray.N, James, A and Givens.B, "A Fussy-K-Nearest Neighbor Algorithm", IEEE Transaction on Systems, Man, and Cybernetics, Vol. SMC-15, No.4, July/Aug (2008).
Jensen .R, and Conelis .C, "Fuzzy-rough nearest neighbor classification and prediction", Theoretical Computer Science, Vol. 412.No. 42, pp. 5871-5884, (2011).
Jensen.R, and Parthalain.N, "Fuzzy rough set based semi-supervised learning", Conf on Fuzzy Systems (Fuzz-IEEE11), pp.52465-2472, (2011). for dimensionality reduction", IEEE Transactions on Knowledge and Data, (2001).
Keller.M, Gray .M, and Givens.J, JR.A, "A Fussy-K-Nearest Neighbor Algorithm", IEEE Trans System, Man, and Cybernetics vol.SMC-15,No.4,pp.580-585, july/aug (1985).
Kelsey.J, Lucks.S, Schneier.B, Stay.M, Wagner.D, and Whiting.D,"Improved cryptanalysis of rijndeal fast software encryption",PP213-230, (2000).
Lecture Notes in Computer Science, "Efficient Softwares implementation of AES on 32-bit Platforms", 2523, (2003).
Li .Y, Guan .C, Li .H, and Chin .Z, "A self-training semi-supervised SVM algorithm and its application in an EEG-based brain computer interface speller system", Pattern Recognition, vol. 29, No. 9, pp. 1285-1294, (2008)
Nurmi.D, Wolski.R, Grzegorczydk.C, Obertelli.G. Soman.S, Youseff.L, and Zagorodnov.D, "Cloud Computing and its Applications". Eucalyptus opensource cloud computing system In CCA08, (2008).
Ram.C, and Sreenivaasan.G, "Security as a Service (SaaS): Securing user data by coprocessor and distributing the data", Trends in information Sciences & Computing (TISC2010), pp. 152-155, (2010).
Schneier.B, Kelsey. J, Whiting. D, Wagner. D, Hall. C, Ferguson. N, Kohno.T, Stay. M "The Two Fish Team's Final Comments on AES Selection", (2000).
Schwartz