Data Mining Technique in Securing the Cloud

Abstract

Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits

Authors and Affiliations

Dr P Karunakar Reddy, Dr K Venkataramana, Dr C. Sunil Kumar

Keywords

Related Articles

Effect of wrist abduction on force applied and response time during touch screen mobile phone use

This study investigated the effect of wrist abduction on force applied and response time while performing the distinct tasks using touch screen mobile phone. For this study, a questionnaire was designed and subjects were...

Microstructure and phase transformation of nearly equiatomic Ni-Ti binary shape memory alloy

The phase transformation and microstructure behavior of Ni-Ti shape memory alloy was investigated by scanning electronic microscope, X-ray diffraction and differential scanning calorimetry. The results showed that the mi...

Heat Transfer Enhancement in a Smart Phone

Smart phones are posed with heat transfer problems due to the space and weight limitation and also due to ever increasing processer speed. In this work, heat transfer in a Xiaomi Mi4i smart phone model has been studied u...

Design And Implementation Of Raspberry Pi 3 Based Embedded System For Analysis Of Soil Parameters

Agriculture has a big role in the socio- economic development of India. From last ten years, few existing Systems working for reducing the agriculture water use. But these systems have some limitations. So Modern technol...

Consumer-Based Brand Equity and Firm Risk

Investors And Managers Evaluate Potential Investments In Terms Of Risk And Return. Research Has Focused On Linking Marketing Activities And Resource Deployments With Returns But Has Largely Neglected Marketing’s Role In...

Download PDF file
  • EP ID EP393795
  • DOI 10.9790/9622-0803020109.
  • Views 92
  • Downloads 0

How To Cite

Dr P Karunakar Reddy, Dr K Venkataramana, Dr C. Sunil Kumar (2018). Data Mining Technique in Securing the Cloud. International Journal of engineering Research and Applications, 8(3), 1-9. https://europub.co.uk/articles/-A-393795