ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING: A REVIEW
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 6
Abstract
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems. Â
Authors and Affiliations
Gagandeep Kaur, Dr. Mohita Garg, Mrs. Navjot Jyoti
Effects of Classification Techniques on Medical Reports Classification
Text classification is the process of assigning pre-defined category labels to documents based on what a classifications has learned from training examples. This paper investigates the partially supervised classification...
Intrinsic and Extrinsic Motivation to E learning in Higher Education Institutions
There were many researches which were conducted about implementation of e learning in Higher Education Institutions, but few of them were focused on the motivation of e learning. Even though, there are many applications...
To investigate the Temporal and Spatial correlation behavioral characteristics of MIMO fading channels
This paper deals with the analysis of performance bounds of narrowband multiple-input multiple-output (MIMO) fading channels considering the transmission links from the mobile station (MS) to the base station (BS) throug...
A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS
It has been observed that IP networks are vulnerable to many kinds of attacks. Among the various attacks possible in IP networks wormhole attack is one which is treated as a very severe attack. In LOLS, multiple fa...
A Prototype for the analysis of Conflict resolving Algorithms in Context aware Environment using simulation
In this paper we are proposing a GUI based Prototype for user centered environment like class room, library hall, laboratory, meeting hall, coffee shop, kitchen, living room and bedroom, which recommends useful services...