An encrypted mechanism for securing cloud data from data mining attacks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Cloud Computing is a vast infrastructural and rising pool which provides huge storage of data in one sphere. Organizations nowadays are in the marathon of equipping the whole system in a cloud form. In this paper we are concern for providing a greater security to the cloud data from data mining attacks. Time complexity and security issue is taken into consideration. Data security and privacy protection issues are associated with cloud computing have been enhanced and modernised in this paper. We have proposed an architecture comprising of various components and network designs which provides a high level of security to the data. The rate of growth of cloud computing is so fast that it has already put its head in the mortar and is spread as the most durable untiring technology now. As cloud computing is a store house of data which might get affected by data mining attacks so we have launched this architecture.
Authors and Affiliations
Priyadarshini Adyasha Pattanaik
Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks
Abstract: As A Result Of Recent Advances In Microelectronic System Fabrication, Progress In Ad-Hoc Networking Routing Protocols, Integrated Circuit Technologies, Wireless Communications, Microprocessor Hardware And...
Evaluation of Intrusion Detection Schemes in Wireless Sensor Network
Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environmentand the s...
Svdadaptive Algorithm For Linear Least Square egressionandanomaly Reduction
In data analysis, the accuracy of analysisdependson (1) the data representation, (2) the algorithm and (3) the metric used to measure error. For ordinary linear least square approximation (OLA), the existing formulation...
Heuristic Programming in Scheduling Problem Using A* Algorithm
Abstract: In preparing the schedule of course not an easy job. There are several aspects that influence in the preparation of schedules of courses that professors, students, courses, lecture rooms, and a time slot. Each...
Opportunistic Networks: A Review
Abstract: Opportunistic network is a wireless ad hoc network. It is a type of delay tolerant network and an extension of mobile ad hoc networks. This network has a special characteristic which is intermittent connectivit...