Skip to main content
Top

2018 | OriginalPaper | Chapter

9. Security and Privacy at Cloud System

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter is focused to provide security mechanism for complete cloud system by implementing encryption and intrusion detection system. Hybrid encryption is applied on data at cloud client level so that data in medium will be safe as well as data will be stored in cloud server in safe mode. Data in server will be accessible only to the authorized users which have the decryption key. Computation for decryption becomes challenging and difficult in case of hybrid encryption. The second phase of security will be applied in cloud server by implementing intrusion detection system which will detect the anomaly traffic towards server and block the unauthorized and unauthenticated traffic. Dimension reduction techniques are also focused in this chapter to make the efficient intrusion detection system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference J. Xiong, X. Liu, Z. Yao, J. Ma, Q. Li, K. Geng, S.P. Chen, A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)CrossRef J. Xiong, X. Liu, Z. Yao, J. Ma, Q. Li, K. Geng, S.P. Chen, A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)CrossRef
2.
go back to reference N. Sengupta, Designing encryption and IDS for cloud security. in The second International Conference on Internet of Things, Data and Cloud Computing (ICC 2017), Cambridge city, Churchill College, University of Cambridge, United Kingdom, 22–23 March 2017 N. Sengupta, Designing encryption and IDS for cloud security. in The second International Conference on Internet of Things, Data and Cloud Computing (ICC 2017), Cambridge city, Churchill College, University of Cambridge, United Kingdom, 22–23 March 2017
3.
go back to reference M. Ficco, M. Rak, Stealthy Denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 3(1), 80–94 (2015)CrossRef M. Ficco, M. Rak, Stealthy Denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 3(1), 80–94 (2015)CrossRef
4.
go back to reference D. Talia, P. Trunfio, F. Marozzo, Data Analysis in the Cloud: Models, Techniques and Applications (Elsevier Science Publishers B.V. Amsterdam, The Netherlands, 2015). ISBN:0128028815 9780128028810 D. Talia, P. Trunfio, F. Marozzo, Data Analysis in the Cloud: Models, Techniques and Applications (Elsevier Science Publishers B.V. Amsterdam, The Netherlands, 2015). ISBN:0128028815 9780128028810
5.
go back to reference C.A. Chen, M. Won, R. Stoleru, G.G. Xie, Energy-efficient fault-tolerant data storage and processing in mobile cloud. IEEE Trans. Cloud Comput. 3(1), 28–41 (2015)CrossRef C.A. Chen, M. Won, R. Stoleru, G.G. Xie, Energy-efficient fault-tolerant data storage and processing in mobile cloud. IEEE Trans. Cloud Comput. 3(1), 28–41 (2015)CrossRef
6.
go back to reference T. Erl, R. Puttini, Z. Mahmood, Cloud Computing:Concepts, Technology and Architecture (Prentice Hall, Englewood Cliffs) T. Erl, R. Puttini, Z. Mahmood, Cloud Computing:Concepts, Technology and Architecture (Prentice Hall, Englewood Cliffs)
7.
go back to reference D. Zissis, D. Lekkas, Addressing cloud computing security issues. Futur. Gener. Comput. Syst. ELSEVIER Int. J. Grid Comput. eScience 28, 583–592 (2012)CrossRef D. Zissis, D. Lekkas, Addressing cloud computing security issues. Futur. Gener. Comput. Syst. ELSEVIER Int. J. Grid Comput. eScience 28, 583–592 (2012)CrossRef
8.
go back to reference S. Thakur, G.J. Breslin, A robust reputation management mechanism in federated cloud. IEEE Trans. Cloud Comput. PP(99), 1 (2017)CrossRef S. Thakur, G.J. Breslin, A robust reputation management mechanism in federated cloud. IEEE Trans. Cloud Comput. PP(99), 1 (2017)CrossRef
9.
go back to reference Z. Zhang, M. Dong, L. Zhu, Z. Guan, R. Chen, R. Xu, K. Ota, Achieving privacy-friendly storage and secure statistics for smart meter data on outsourced clouds. IEEE Trans. Cloud Comput. PP(99), 1 (2017) Z. Zhang, M. Dong, L. Zhu, Z. Guan, R. Chen, R. Xu, K. Ota, Achieving privacy-friendly storage and secure statistics for smart meter data on outsourced clouds. IEEE Trans. Cloud Comput. PP(99), 1 (2017)
10.
go back to reference J. Baek, H.Q. Vu, K.J. Liu, X. Huang, Y. Xiang, A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)CrossRef J. Baek, H.Q. Vu, K.J. Liu, X. Huang, Y. Xiang, A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)CrossRef
11.
go back to reference S. Jiang, X. Zhu, L. Guo, J. liu, Publicly verifiable boolean query over outsourced encrypted data. IEEE Trans. Cloud Comput. PP(99), 1 (2017) S. Jiang, X. Zhu, L. Guo, J. liu, Publicly verifiable boolean query over outsourced encrypted data. IEEE Trans. Cloud Comput. PP(99), 1 (2017)
12.
go back to reference M.K. SIM, Agent-based approaches for intelligent intercloud resource allocation. IEEE Trans. Cloud Comput. PP(99), 1 (2016)CrossRef M.K. SIM, Agent-based approaches for intelligent intercloud resource allocation. IEEE Trans. Cloud Comput. PP(99), 1 (2016)CrossRef
14.
go back to reference P.R. Padhy, R.M. Patra, C.S. Satapathy, Cloud computing: security issues and research challenges. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. 1(2) (2011) P.R. Padhy, R.M. Patra, C.S. Satapathy, Cloud computing: security issues and research challenges. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. 1(2) (2011)
15.
go back to reference P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub, D. Zeghlache, Challenges for cloud networking security. HP Laboratories P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub, D. Zeghlache, Challenges for cloud networking security. HP Laboratories
16.
go back to reference H. Liu, B. He, X. Liao, H. Jin, Towards declarative and data-centric virtual machine image management in IaaS clouds. IEEE Trans. Cloud Comput. PP(99), 1 (2017) H. Liu, B. He, X. Liao, H. Jin, Towards declarative and data-centric virtual machine image management in IaaS clouds. IEEE Trans. Cloud Comput. PP(99), 1 (2017)
17.
go back to reference P. Jamshidi, A. Ahmad, C. Pahl, Cloud migration research: a systematic review. IEEE Trans. Cloud Comput. 1(2), 142–157 (2013)CrossRef P. Jamshidi, A. Ahmad, C. Pahl, Cloud migration research: a systematic review. IEEE Trans. Cloud Comput. 1(2), 142–157 (2013)CrossRef
18.
go back to reference Y. Zhang, X. Liao, H. Jin, G. Min, Resisting skew-accumulation for time-stepped applications in the cloud via exploiting parallelism. IEEE Trans. Cloud Comput. 3(1), 54–65 (2015)CrossRef Y. Zhang, X. Liao, H. Jin, G. Min, Resisting skew-accumulation for time-stepped applications in the cloud via exploiting parallelism. IEEE Trans. Cloud Comput. 3(1), 54–65 (2015)CrossRef
20.
go back to reference N. vurukonda, T.B. Rao, A study on data storage security issues in cloud computing. in 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), vol. 92 (Elsevier Procedia Computer Science, 2016), pp. 128–135CrossRef N. vurukonda, T.B. Rao, A study on data storage security issues in cloud computing. in 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), vol. 92 (Elsevier Procedia Computer Science, 2016), pp. 128–135CrossRef
21.
go back to reference N.P. Smart, Algorithms, key size and parameters report, European Union Agency for Network and Information Security, 2014 N.P. Smart, Algorithms, key size and parameters report, European Union Agency for Network and Information Security, 2014
22.
go back to reference T. Olufon, E.-A.C. Campbell, S. Hole, K. Radhakrishnan, A. Sedigh, Mitigating external threats in wireless local area networks. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 6(3), 200 (2014) T. Olufon, E.-A.C. Campbell, S. Hole, K. Radhakrishnan, A. Sedigh, Mitigating external threats in wireless local area networks. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 6(3), 200 (2014)
23.
go back to reference F. Ayoub, K. Singh, Cryptographic techniques and network security. IEE Proc. F Commun. Radar Signal Process. 131(7) (2008)CrossRef F. Ayoub, K. Singh, Cryptographic techniques and network security. IEE Proc. F Commun. Radar Signal Process. 131(7) (2008)CrossRef
24.
go back to reference U. Somani, K. Lakhani, M. Mundra, Implementing digital signature with rsa encryption algorithm to enhance the data security of cloud in cloud computing. in 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) (2010) U. Somani, K. Lakhani, M. Mundra, Implementing digital signature with rsa encryption algorithm to enhance the data security of cloud in cloud computing. in 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) (2010)
25.
go back to reference T. Cusick, P. Stanica, Cryptographic Boolean Functions and Applications (Elsevier). eBook ISBN: 9780128111307 T. Cusick, P. Stanica, Cryptographic Boolean Functions and Applications (Elsevier). eBook ISBN: 9780128111307
26.
go back to reference M. Abdalla, X. Boyen, C. Chevalier, D. Pointcheval, Distributed public-key cryptography from weak secrets, in Public Key Cryptography PKC 2009, ed. by S. Jarecki, G. Tsudik. PKC 2009. Lecture Notes in Computer Science, vol. 5443 (Springer, Berlin, 2009)CrossRef M. Abdalla, X. Boyen, C. Chevalier, D. Pointcheval, Distributed public-key cryptography from weak secrets, in Public Key Cryptography PKC 2009, ed. by S. Jarecki, G. Tsudik. PKC 2009. Lecture Notes in Computer Science, vol. 5443 (Springer, Berlin, 2009)CrossRef
27.
go back to reference U. Somani, K. Lakhani, M. Mundra, Implementing digital signature with rsa encryption algorithm to enhance the data security of cloud in cloud computing. in 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) (2010) U. Somani, K. Lakhani, M. Mundra, Implementing digital signature with rsa encryption algorithm to enhance the data security of cloud in cloud computing. in 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) (2010)
28.
go back to reference N. Sengupta, Intrusion detection system for cloud computing. in Middle East and North Africa Conference for Public Administration Research, Bahrain, 23–24 April 2014 N. Sengupta, Intrusion detection system for cloud computing. in Middle East and North Africa Conference for Public Administration Research, Bahrain, 23–24 April 2014
29.
go back to reference D.E. Denning, An intrusion-detection model. IEEE Trans. Softw. Eng. SE–13(2), 222–232 (1987)CrossRef D.E. Denning, An intrusion-detection model. IEEE Trans. Softw. Eng. SE–13(2), 222–232 (1987)CrossRef
30.
go back to reference Aydin, EhsanAmiri E., Keshavarz, H., Mohamadi, E., Moradzadeh, H. : Intrusion detection systems in manet: a review. in Elsevier, International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 Sept 2013 Aydin, EhsanAmiri E., Keshavarz, H., Mohamadi, E., Moradzadeh, H. : Intrusion detection systems in manet: a review. in Elsevier, International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 Sept 2013
31.
go back to reference S. Roschke, C. Feng, C. Meinel, Intrusion detection in the cloud, dependable, autonomic and secure computing, in DASC09, Eighth IEEE International Conference (2009), pp. 729–734. E-ISBN: 978-1-4244-5421-1 S. Roschke, C. Feng, C. Meinel, Intrusion detection in the cloud, dependable, autonomic and secure computing, in DASC09, Eighth IEEE International Conference (2009), pp. 729–734. E-ISBN: 978-1-4244-5421-1
32.
go back to reference Y. Mehmood, U. Habiba, M.A. Shibli, R. Masood, Intrusion detection system in cloud computing: challenges and opportunities. in 2nd National Conference on Information Assurance (NCIA) (2013) Y. Mehmood, U. Habiba, M.A. Shibli, R. Masood, Intrusion detection system in cloud computing: challenges and opportunities. in 2nd National Conference on Information Assurance (NCIA) (2013)
33.
go back to reference A. Patel, M. Taghavia, K. Bakhtiyaria, J.C. Jnior, An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 2541 p (2013)CrossRef A. Patel, M. Taghavia, K. Bakhtiyaria, J.C. Jnior, An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 2541 p (2013)CrossRef
34.
go back to reference X. Ren, Intrusion detection method using protocol classification and rough set based support vector machine. Comput. Inf. Sci. 2(4), 100–108 (2009) X. Ren, Intrusion detection method using protocol classification and rough set based support vector machine. Comput. Inf. Sci. 2(4), 100–108 (2009)
35.
go back to reference Z. Yu, J.J.P. Tsai, Intrusion Detection, A Machine Learning Approach, vol. 3 (Imperial College Press, London, 2011). ISBN-13: 978-1848164475 Z. Yu, J.J.P. Tsai, Intrusion Detection, A Machine Learning Approach, vol. 3 (Imperial College Press, London, 2011). ISBN-13: 978-1848164475
36.
go back to reference R.P. Patil, Y. Sharma, M. Kshirasagar, Performance analysis of intrusion detection systems implemented using hybrid machine learning techniques. Int. J. Comput. Appl. (0975–8887) 133(8) (2016) R.P. Patil, Y. Sharma, M. Kshirasagar, Performance analysis of intrusion detection systems implemented using hybrid machine learning techniques. Int. J. Comput. Appl. (0975–8887) 133(8) (2016)
37.
go back to reference A.M. Aydin, H.A. Zaim, G.K. Ceylan, A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35, 517–526 (2009). ElsevierCrossRef A.M. Aydin, H.A. Zaim, G.K. Ceylan, A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35, 517–526 (2009). ElsevierCrossRef
38.
go back to reference D. Anderson, T. Lunt, H. Javitz, A. Tamaru, A. Valdes. Safeguard final report: Detecting unusual program behavior using the NIDES statistical component, Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 1993 D. Anderson, T. Lunt, H. Javitz, A. Tamaru, A. Valdes. Safeguard final report: Detecting unusual program behavior using the NIDES statistical component, Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 1993
39.
go back to reference Lianying, L. Fengyu, A Swarm-intelligence-based intrusion detection technique. IJCSNS Int. J. Comput. Sci. Netw. Secur. 6(7B) (2006) Lianying, L. Fengyu, A Swarm-intelligence-based intrusion detection technique. IJCSNS Int. J. Comput. Sci. Netw. Secur. 6(7B) (2006)
40.
go back to reference S. Owais, V. Snasel, P. Kromer, A. Abraham, Survey: Using genetic algorithm approach in intrusion detection systems techniques. in CISIM 2008 (IEEE, 2008), pp. 300–307 S. Owais, V. Snasel, P. Kromer, A. Abraham, Survey: Using genetic algorithm approach in intrusion detection systems techniques. in CISIM 2008 (IEEE, 2008), pp. 300–307
41.
go back to reference P. LaRoche, N.A. ZincirHeywood, 802.11 network intrusion detection using genetic programming. in Proceeding GECCO ’05 Proceedings of the 2005 workshops on Genetic and evolutionary computation (2005), pp. 170–171 P. LaRoche, N.A. ZincirHeywood, 802.11 network intrusion detection using genetic programming. in Proceeding GECCO ’05 Proceedings of the 2005 workshops on Genetic and evolutionary computation (2005), pp. 170–171
42.
go back to reference Y. LIN, Y. ZHANG, OU Yang-Jia, : The design and implementation of host-based intrusion detection system. Third International Symposium on Intelligent Information Technology and Security Informatics, 2010 Y. LIN, Y. ZHANG, OU Yang-Jia, : The design and implementation of host-based intrusion detection system. Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
43.
go back to reference R.W. Swiniarski, Rough sets methods in feature reduction and classification. Int. J. Appl. Math. Comput. Sci. 11(3), 565–582 (2001)MathSciNetMATH R.W. Swiniarski, Rough sets methods in feature reduction and classification. Int. J. Appl. Math. Comput. Sci. 11(3), 565–582 (2001)MathSciNetMATH
44.
go back to reference Y. Zhao, F. Luo, S.K.M. Wong, Y.Y. Yao, A general definition of an attribute reduct. in Proceedings of Rough Sets and Knowledge Technology, Second International Conference, RSKT 2007, LNAI 4481 (2007), pp. 101–108 Y. Zhao, F. Luo, S.K.M. Wong, Y.Y. Yao, A general definition of an attribute reduct. in Proceedings of Rough Sets and Knowledge Technology, Second International Conference, RSKT 2007, LNAI 4481 (2007), pp. 101–108
45.
go back to reference L. Cuijuan, L. Yuanyuan, Q. Qin Yankai, Research on anomaly intrusion detection based on rough set attribute reduction. in The 2nd International Conference on Computer Application and System Modeling (Atlantis Press, Paris, France, 2012) L. Cuijuan, L. Yuanyuan, Q. Qin Yankai, Research on anomaly intrusion detection based on rough set attribute reduction. in The 2nd International Conference on Computer Application and System Modeling (Atlantis Press, Paris, France, 2012)
46.
go back to reference M. Sammany, T. Medhat, Dimensionality reduction using rough set approach for two neural networks-based applications. in Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms (Springer, Berlin, 2007), pp. 639–647 M. Sammany, T. Medhat, Dimensionality reduction using rough set approach for two neural networks-based applications. in Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms (Springer, Berlin, 2007), pp. 639–647
47.
go back to reference R. Jensen, Q. Shen, Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches (Wiley-IEEE Press, Oxford, 2008)CrossRef R. Jensen, Q. Shen, Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches (Wiley-IEEE Press, Oxford, 2008)CrossRef
48.
go back to reference J.R. Anaraki, M. Eftekhari, Improving Fuzzy-rough quick reduct for feature selection. in IEEE 19th Iranian Conference on Electrical Engineering (ICEE) (2011), pp. 1–6 J.R. Anaraki, M. Eftekhari, Improving Fuzzy-rough quick reduct for feature selection. in IEEE 19th Iranian Conference on Electrical Engineering (ICEE) (2011), pp. 1–6
49.
go back to reference P.E. Ephzibah, B. Sarojini, E.J. Sheela, A study on the analysis of genetic algorithms with various classification techniques for feature selection. Int. J. Comput. Appl. 8(8), 33 (2010) P.E. Ephzibah, B. Sarojini, E.J. Sheela, A study on the analysis of genetic algorithms with various classification techniques for feature selection. Int. J. Comput. Appl. 8(8), 33 (2010)
50.
go back to reference B. Zadrozny, Learning and evaluating classifiers under sample selection bias. in International Conference on Machine Learning ICML’04 (2004) B. Zadrozny, Learning and evaluating classifiers under sample selection bias. in International Conference on Machine Learning ICML’04 (2004)
51.
go back to reference Y.X. Wang, G. Whitwell, M.J. Garibaldi, The application of a simulated annealing fuzzy clustering algorithm for cancer diagnosis. in Proceedings of IEEE 4th International Conference on Intelligent Systems Design and Application, Budapest, Hungary, 26–28 August 2004, pp. 467–472 Y.X. Wang, G. Whitwell, M.J. Garibaldi, The application of a simulated annealing fuzzy clustering algorithm for cancer diagnosis. in Proceedings of IEEE 4th International Conference on Intelligent Systems Design and Application, Budapest, Hungary, 26–28 August 2004, pp. 467–472
52.
go back to reference R.C. Chen, K.F. Cheng, C.F. Hsieh, Using rough set and support vector machine for network intrusion detection. Int. J. Netw. Secur. Appl. (IJNSA) 1(1) (2009) R.C. Chen, K.F. Cheng, C.F. Hsieh, Using rough set and support vector machine for network intrusion detection. Int. J. Netw. Secur. Appl. (IJNSA) 1(1) (2009)
53.
go back to reference Z. Pawlak, Rough Sets Theoretical Aspects of Reasoning about Data, vol. 229 (Kluwer Academic Publishers, Boston, 1991)MATH Z. Pawlak, Rough Sets Theoretical Aspects of Reasoning about Data, vol. 229 (Kluwer Academic Publishers, Boston, 1991)MATH
54.
go back to reference Z. Pawlak, Rough set theory and its applications to data analysis. Cybern. Syst. 29, 661–688 (1998)CrossRef Z. Pawlak, Rough set theory and its applications to data analysis. Cybern. Syst. 29, 661–688 (1998)CrossRef
55.
go back to reference N. Sengupta, J. Sen, J. Sil, M. Saha, Designing of on line intrusion detection system using rough set theory and Q learning algorithm. Neurocomputing (Elsevier Journal) 111, 161–168 (2013)CrossRef N. Sengupta, J. Sen, J. Sil, M. Saha, Designing of on line intrusion detection system using rough set theory and Q learning algorithm. Neurocomputing (Elsevier Journal) 111, 161–168 (2013)CrossRef
56.
go back to reference Y. Yao, Discernibility matrix simplification for constructing attribute reducts. Inf. Sci. 179(5), 867–882 (2009)MathSciNetCrossRef Y. Yao, Discernibility matrix simplification for constructing attribute reducts. Inf. Sci. 179(5), 867–882 (2009)MathSciNetCrossRef
57.
go back to reference Y. Zhao, Y. Yao, F. Luo, Data analysis based on discernibility and indiscernibility. Inf. Sci. 177, 4959–4976 (2007). Elsevier IncCrossRef Y. Zhao, Y. Yao, F. Luo, Data analysis based on discernibility and indiscernibility. Inf. Sci. 177, 4959–4976 (2007). Elsevier IncCrossRef
58.
go back to reference A. Skowron, C. Rauszer, The discernibility matrices and functions in information systems, in Intelligent Decision Support-Handbook of Applications and Advances of the Rough Sets Theory, ed. by R. Slowinski (Springer, Dordrecht, 1991), pp. 331–362 A. Skowron, C. Rauszer, The discernibility matrices and functions in information systems, in Intelligent Decision Support-Handbook of Applications and Advances of the Rough Sets Theory, ed. by R. Slowinski (Springer, Dordrecht, 1991), pp. 331–362
59.
go back to reference H. Li, Q. Zhang, J. Deng, B.Z. Xu, A preference-based multiobjective evolutionary approach for sparse optimization. IEEE Trans. Neural Netw. Learn. Syst. PP(99), 1–16 (2017) H. Li, Q. Zhang, J. Deng, B.Z. Xu, A preference-based multiobjective evolutionary approach for sparse optimization. IEEE Trans. Neural Netw. Learn. Syst. PP(99), 1–16 (2017)
60.
go back to reference J. Faigi, A.G. Hollinger, Autonomous data collection using a self-organizing map. IEEE Trans. Neural Netw. Learn. Syst. PP(99), 1–13 (2017) J. Faigi, A.G. Hollinger, Autonomous data collection using a self-organizing map. IEEE Trans. Neural Netw. Learn. Syst. PP(99), 1–13 (2017)
61.
go back to reference A.N. Alias, M.H.N. Radzi, Fingerprint classification using support vector machine. in 2016 Fifth ICT International Student Project Conference (ICT-ISPC), 27–28 May 2016 A.N. Alias, M.H.N. Radzi, Fingerprint classification using support vector machine. in 2016 Fifth ICT International Student Project Conference (ICT-ISPC), 27–28 May 2016
62.
go back to reference S.K.M. Varma, K.K.N. Rao, K.K. Raju, S.P.G. Varma, Pixel-based classification using support vector machine classifier. in 2016 IEEE 6th International Conference on Advanced Computing (IACC), 27–28 Feb 2016 S.K.M. Varma, K.K.N. Rao, K.K. Raju, S.P.G. Varma, Pixel-based classification using support vector machine classifier. in 2016 IEEE 6th International Conference on Advanced Computing (IACC), 27–28 Feb 2016
63.
go back to reference H.A. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks. in Proceedings of International Symposium on Applications and the Internet (SAINT 2003) (2003), pp. 209–217 H.A. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks. in Proceedings of International Symposium on Applications and the Internet (SAINT 2003) (2003), pp. 209–217
64.
go back to reference S.S. Keerthi, S.K. Shevade, C. Bhattacharyya, K.R.K. Murthy, A fast iterative nearest point algorithm for support vector machine classifier design. IEEE Trans. Neural Netw. 11, 124–136 (2000)CrossRef S.S. Keerthi, S.K. Shevade, C. Bhattacharyya, K.R.K. Murthy, A fast iterative nearest point algorithm for support vector machine classifier design. IEEE Trans. Neural Netw. 11, 124–136 (2000)CrossRef
65.
go back to reference C. Cortes, V.N. Vapnik, Support vector network. Mach. Learn. 20, 273–297 (1995)MATH C. Cortes, V.N. Vapnik, Support vector network. Mach. Learn. 20, 273–297 (1995)MATH
Metadata
Title
Security and Privacy at Cloud System
Author
Nandita Sengupta
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-73676-1_9

Premium Partner