Enhancing Cloud Computing Security by Using Pixel Key Pattern

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 7

Abstract

Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems.  

Authors and Affiliations

Randeep Kaur, Jagroop Kaur

Keywords

Related Articles

Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs

In this paper, we perform rigorous analysis of MANET routing protocols selected from different categories over various scenarios using a large set of performance evaluation metrics. The traffic that we model on source-de...

Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs

In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due...

A Mobile Technology for Hazard Management System

The Japan is one of the countries in the world vulnerable to natural hazards because of its geographic location. Due to the advances of Internet and mobile technologies, mobile phones with Internet connection and computa...

Comparative Analysis of Kohonen-SOM and K-Means data mining algorithms based on Academic Activities

With the increasing demand of IT and subsequent growth in this sector, the high- dimensional data came into existence. Data Mining plays an important role in analyzing and extracting the useful information. The key infor...

A REVIEW ON DATA COLLECTION USING MOBILE NODES IN WSN

Wireless sensor networks have become increasingly popular due to their wide range of application. Clustering sensor nodes organizing them hierarchically have proven to be an effective method to provide better data aggreg...

Download PDF file
  • EP ID EP650716
  • DOI 10.24297/ijct.v14i7.1894
  • Views 86
  • Downloads 0

How To Cite

Randeep Kaur, Jagroop Kaur (2015). Enhancing Cloud Computing Security by Using Pixel Key Pattern. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(7), 5919-5928. https://europub.co.uk/articles/-A-650716