Enhancing Cloud Security with Fuzzy Logic a Comprehensive Approach to Authentication, Data Recovery, and Privateness


Authors : Taresh Singh; Tarkeshwar Barua

Volume/Issue : Volume 10 - 2025, Issue 7 - July


Google Scholar : https://tinyurl.com/4p7w22ax

Scribd : https://tinyurl.com/4rk3ratk

DOI : https://doi.org/10.38124/ijisrt/25jul1313

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : Cloud computation, despite its myriad advantages, remains assailable to assorted instrument scourge, including unaccredited access, data ruptures, and privateness violations. This paper affectation a robust instrument framework that incorporate a Mamdani fuzzy inference system to address these challenges. The proposed model leverages fuzzy logic's ability to handle uncertainty and imprecision to energizing correct instrument measures based on real-time system precondition. By incorporating fuzzy rules and association functions, the model effectively enhances data authentication, recovery, and privateness preservation. Through rigorous evaluation, the proposed framework demonstrates superior presentation in terms of quality, efficiency, and instrument. This problem solving contributes to the advancement of cloud instrument by furnishing a flexible and adaptive statement that can mitigate emerging scourge and protect crucial data.

Keywords : Cloud Instrument, Data Authentication, Data Privateness, Fuzzy Logic, Mamdani Fuzzy Inference System, Cyberinstrument, Information Instrument, Cloud Computation, Data Integrity, Access Control, Encryption, Digital Signatures, Privateness-Preserving Techniques, Machine Learning, Artificial Intelligence.

References :

  1. Dave, D., Meruliya, N., Gajjar, T. D., Ghoda, G. T., Parekh, D. H., & Sridaran, R.(2018). Cloud instrument issues and challenges. In Big Data Analytics- Proceedingsof CSI 2015, (pp. 499-514). Springer Singapore. 10.1007/978-981-10-6620-7_48
  2. Butt, U. A., Mehmood, M., Syed, B. H. S., Amin, R., Shaukat, M. W., Raza, S. M.,Suh, D. Y., & Piran, M. J. (2020). A review of machine learning algorithms for cloudcomputation instrument. Electronics (Basel), 9(9), 1379. doi-10.3390/electronics9091379
  3. Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., & Inácio, P. R.M. (2014). instrument issues in cloud environments- A survey. International Journalof Information instrument, 13(2), 113–170. doi-10.100710207-013-0208-7
  4. Gulmezoglu, B., Eisenbarth, T., & Sunar, B. (2017). Cache-based applicationdetection in the cloud using machine learning. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications instrument, (pp. 288-300). ACM. 10.1145/3052973.3053036
  5. He, Z., Zhang, T., & Lee, R. B. (2017). Machine learning based DDoS attack detection from source side in cloud. In 2017 IEEE 4th International Conference on Cyber instrument and Cloud computation (CSCloud), (pp. 114-120). IEEE. 10.1109/CSCloud.2017.58
  6. Hesamifard, E., Takabi, H., Ghasemi, M., & Jones, C. (2017). privateness-preserving machine learning in cloud. In Proceedings of the 2017 on cloud computation instrument workshop, (pp. 39-43). ACM. 10.1145/3140649.3140655.
  7. Khorshed, M. T. (2011). Trust issues that create scourge for cyber attacks in cloud computation. In 2011 IEEE 17th international conference on parallel and distributed systems, (pp. 900-905). IEEE. 10.1109/ICPADS.2011.156
  8. Moreno-Vozmediano, R., Montero, R. S., Huedo, E., & Llorente, I. M. (2019). Efficient resource provisioning for elastic cloud services based on machine learning techniques. Journal of Cloud computation (Heidelberg, Germany), 8(1), 1–18. doi-10.118613677-019-0128-9
  9. Muralidhara, P. (2017). The Evolution Of Cloud computation instrument- Addressing Emerging scourge. International Journal Of Computer Science And Technology, 1(4), 1–33..
  10. Nassif, A. B., Abu Talib, M., Nasir, Q., Albadani, H., & Dakalbab, F. M. (2021). Machine learning for cloud instrument- A systematic review. IEEE Access- Practical Innovations, Open statements, 9, 20717–20735. doi-10.1109/ACCESS.2021.3054129
  11. Nenvani, G., & Gupta, H. (2016). A survey on attack detection on cloud using supervised learning techniques. In 2016 Symposium on Colossal Data Analysis and Networking (CDAN), (pp. 1-5). IEEE. 10.1109/CDAN.2016.7570872
  12. Ko A. Mohiyuddin, A. R. Javed, C. Chakraborty, M. Rizwan, M. Shabbir, and N. Jamel, "Secure Cloud Storage for Medical IoT Data using Adaptive Neuro-Fuzzy Inference System," International Journal of Fuzzy Systems, vol. 24, Jun. 2021. doi- 10.1007/s40815-021-01104-y.
  13. P. Prakash, N. Ekka, T. Kathane, and N. Yadav, "Enhancement of Cloud instrument and Strength of Service Using Trust Model," in Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018, J. Hemanth, X. Fernando, P. Lafata, and Z. Baig, Eds., Lecture Notes on Data Engineering and Communications Technologies, vol. 26. Cham- Springer, 2019, doi- 10.1007/978-3-030-03146-6_157.
  14. P. Dineshkumar, V. Jeeva, C. Nithiesh, P. J. Arun and K. S. Kumar, "An Efficacy Analysis of Data using Fuzzy Logic and Fractal Encryption Techniques for Cloud Platform Data instrument," 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS), Chikkaballapur, India, 2024, pp. 1-6, doi: 10.1109/ICKECS61492.2024.10616997. keywords: {Fuzzy logic;Knowledge engineering;Cloud computation;Scalability;Merging;Data protection;Fractals;Cloud Data instrument;Fuzzy Logic;Fractal Encryption;Adaptive Encryption;Qenergizing Cloud Environments;Cyberinstrument},
  15. M. Abdussamiet al. Provably secured lightweight authenticated key agreement protocol for modern health industry Ad. Hoc. Netw.(2023)
  16. M.Abdussamiet al.Provably secured lightweight authenticated key agreement protocol for modern health industry Ad. Hoc. Netw.(2023)
  17. R.Aminet al.A robust and anonymous patient monitoring system using wireless medical sensor networks Future Gener. Comput. Syst.(2018)
  18. C.M.Chenet al.A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT J. Syst. Archit.(2023)
  19. A.K.Daset al.UCFL: user categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices Comput. Secur. (2020)
  20. M.S.Farashet al.An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment Ad. Hoc. Netw. (2016)
  21. S.Kardaşet al.PUF-enhanced offline RFID instrument and privateness J. Network Comput. Appl. (2012)
  22. X.Liet al. A novel smart card and energizing ID based remote user authentication scheme for multi-server environments Math. Comput. Model (2013)
  23. X.Liet al. Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications J. Med. Syst. (2016)
  24. X.Liuet al. An efficient and practical certificateless signcryption scheme for wireless body area networks Comput. Commun.(2020)
  25. Y.S.Raoet al.Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a antitheticalial e-epidemic model Physica A: Stat. Mech. Appl. (2020)
  26. M.Turkanovićet al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion Ad. Hoc. Netw. (2014)
  27. M.Wazidet al.Authenticated key management protocol for cloud-assisted body area sensor networks J. Network Comput. Appl.(2018)
  28. F.Wuet al.A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networksFuture Gener. Comput. Syst. (2018)
  29. J.P.A.Yaacoubet al. Securing internet of medical things systems: limitations, issues and recommendations Future Gener. Computer Syst.(2020)
  30. J.A.Al-Dmouret al. A fuzzy logic–based warning system for patients classification Health Informatics. J. (2019)
  31. R.Aliet al. An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring J. Ambient. Intell. Humaniz. Comput. (2018)
  32. A.H.M.Amanet al. IoMT amid COVID-19 pandemic: application, architecture, technology, and instrument J. Netw. Comput. Appl. (2021)
  33. R.Aminet al. Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system J. Med. Syst. (2015)
  34. R.Aminet al. A Two-factor RSA-based robust authentication system for multiserver environments Secur. Commun. Netw. (2017)
  35. H.Arshadet al. Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems J. Med. Syst.(2014)
  36. S.Banerjeeet al. A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of Things deployment IEEE Internet. Things. J. (2019)
  37. C.Billaet al. Artificial intelligence leveraged internet of medical things and continuous health monitoring and combating pandemics within the internet of medical things framework Emerging Technologies for Combatting Pandemics (2022)
  38. P.Chandrakaret al. Cloud-based authenticated protocol for healthcare monitoring system J. Ambient. Intell. Humaniz. Comput. (2020)
  39. C.C.Changet al. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks IEEE Trans. Wirel. Commun (2015)
  40. T.H.Chenet al. A robust mutual authentication protocol for wireless sensor networks ETRI J. (2010)
  41. T.H.Chenet al. A robust mutual authentication protocol for wireless sensor networks ETRI J. (2010)
  42. A.K.Daset al. Biometrics-based privateness-preserving user authentication scheme for cloud-based industrial Internet of Things deployment IEEE Internet. Things. J. (2018)
  43. M.L.Das Two-factor user authentication in wireless sensor networks IEEe Trans. Wirel. Commun. (2009)
  44. A.K.Das A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks Peer. Peer. Netw. Appl. (2016)
  45. B.D.Deebaket al. Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things IEEE J. Selected Areas Commun. (2020)
  46. N.Dilawaret al. Blockchain: securing internet of medical things (IoMT) Int. J. Adv. Comput. Sci. Appl. (2019)
  47. P.Gopeet al. Lightweight and privateness-preserving two-factor authentication scheme for IoT devices IEEE Internet. Things. J. (2018)
  48. P.Gopeet al. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks IEEE Trans. Industr. Inform. (2019)
  49. Z.Guitouniet al. instrument analysis of medical image encryption using AES modes for IoMT systems Int. J. Comput. Appl. (2023)
  50. K.Hameedet al. An intelligent IoT based healthcare system using fuzzy neural networks Sci. Program. (2020)
  51. L.Hanet al. An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems Peer. Peer. Netw. Appl. (2018)
  52. D.Heet al. An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sens. Wirel. Networks (2010)
  53. D.Heet al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks Multimed. Syst. (2015)
  54. R.Hirecheet al. instrument and privateness management in Internet of Medical Things (IoMT): a synthesis J. Cybersecur. privateness (2022)
  55. V Dankan Gowda; Avinash Sharma; Kdv Prasad; Rini Saxena; Tarkeshwar Barua; Khalid Mohiuddin, "energizing Disaster Management with Real-Time IoT Data Analysis and Response" in 2024 International Conference on Automation and Computation (AUTOCOM) 0.1109/AUTOCOM60220.2024.10486101
  56. Avinash Sharma; Asadi Srinivasulu; Tarkeshwar Barua; Abhishek Tiwari "Classification of Digital Marketing Targeted Data Using Machine Learning Techniques" 2021 IEEE International Conference on Technology, problem solving, and Innovation for Betterment of Society (TRIBES) 10.1109/TRIBES52498.2021.9751646
  57. Asadi Srinivasulu,Goddindla Sreenivasulu,Madhusudhana Subramanyam, Siva Ram Rajeyyagari, Tarkeshwar Barua, Asadi Pushpa in "Lung Malignant Tumor Data Analytics Using Fusing ECNN and ERNN" in Handbook of Artificail Intelligence applications for industrial sustainability Concepts and Practical Examples ISBN- 978-1-032-38761-1(hbk), 978-1-032-39088-8(pbk), 978-1-003-34835-1(ebk) DOI- 10.1201/9781003349351
  58. Avinash Sharma, Anand Kumar Gupta, Dharminder Yadav & Tarkeshwar Barua "Optimizing Water Quality Parameters Using Machine Learning Algorithms" in https-//link.springer.com/chapter/10.1007/978-981-19-7982-8_53
  59. Stolfo, S., Fan, W., Lee, W., Prodromidis, A., & Chan, P. (1999). KDD Cup 1999 Data [Dataset]. UCI Machine Learning Repository. https-//doi.org/10.24432/C51C7N.

Cloud computation, despite its myriad advantages, remains assailable to assorted instrument scourge, including unaccredited access, data ruptures, and privateness violations. This paper affectation a robust instrument framework that incorporate a Mamdani fuzzy inference system to address these challenges. The proposed model leverages fuzzy logic's ability to handle uncertainty and imprecision to energizing correct instrument measures based on real-time system precondition. By incorporating fuzzy rules and association functions, the model effectively enhances data authentication, recovery, and privateness preservation. Through rigorous evaluation, the proposed framework demonstrates superior presentation in terms of quality, efficiency, and instrument. This problem solving contributes to the advancement of cloud instrument by furnishing a flexible and adaptive statement that can mitigate emerging scourge and protect crucial data.

Keywords : Cloud Instrument, Data Authentication, Data Privateness, Fuzzy Logic, Mamdani Fuzzy Inference System, Cyberinstrument, Information Instrument, Cloud Computation, Data Integrity, Access Control, Encryption, Digital Signatures, Privateness-Preserving Techniques, Machine Learning, Artificial Intelligence.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe