An encrypted mechanism for securing cloud data from data mining attacks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Cloud Computing is a vast infrastructural and rising pool which provides huge storage of data in one sphere. Organizations nowadays are in the marathon of equipping the whole system in a cloud form. In this paper we are concern for providing a greater security to the cloud data from data mining attacks. Time complexity and security issue is taken into consideration. Data security and privacy protection issues are associated with cloud computing have been enhanced and modernised in this paper. We have proposed an architecture comprising of various components and network designs which provides a high level of security to the data. The rate of growth of cloud computing is so fast that it has already put its head in the mortar and is spread as the most durable untiring technology now. As cloud computing is a store house of data which might get affected by data mining attacks so we have launched this architecture.
Authors and Affiliations
Priyadarshini Adyasha Pattanaik
A Study to the different implementation approaches for the Grid YM-Algorithm DNA alignment
Abstract: DNA Multiple sequence alignment is common bioinformatics application that determines the similarity between a new sequence with other exist sequences. Needleman-Wunsch algorithm is the most famous algorithm for...
Effect of Thermal Radiation on Unsteady Gravity Flow of a Power-Law Fluid with Viscous Dissipation through a Porous Medium
Abstract:In this work, we studied the effect of thermal radiation on unsteady gravity flow of a power-law fluid with viscous dissipation through a porous medium. The modified Darcy’s law is considered together with...
An Intelligent Meta Search Engine for Efficient Web DocumentRetrieval
Abstract: In daily use of internet, when searching information we face lots of difficulty due to the rapid growthof Information Resources. This is because of the fact that a single search engine cannot index the en...
Secure Transmission of Record after Record Linkage for Crime Detection Using AES
Abstract:In many applications like crime detection, health sector, taxation sector etc… record linkage is used to find out the matched data items from different data sources. Finding matched records from different...
A Proposed Framework for Managing Technical People in Software Projects
Abstract: The human is the most significant success factor in any organization, or project. The main purpose of this research is to introduce a proposed framework for enhancing the technical team management in Informatio...