AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 5
Abstract
Cloud computing is an umbrella term used to refer to Internet based development and services. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Due to this greater level of flexibility, the cloud has become the breeding ground of a new generation of products and services. However, the flexibility of cloud-based services comes with the risk of the security and privacy of users’ data. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. One of the security concerns of cloud is data mining based privacy attacks that involve analyzing data over a long period to extract valuable information. In this paper, we first identify the data mining based privacy risks on cloud data and propose a distributed architecture to eliminate the risks in Rain-cloud environment.
Authors and Affiliations
D. Sudhagar
INHIBITION OF E.CANCEROGENUS MAB-1 β -LACTAMASE BY SYNERGISTIC FORMULATION: AN IN VITRO HERBAL SHOTGUN STUDY
β-lactamases are increasing worldwide speedily by creating problem to currently available UTI therapies and hence there is an urgent need of research to find the effective therapy. In the present study we propose to deve...
IMPROVE STEAM TURBINE EFFICIENCY BY USE OF REHEAT RANKINE CYCLE
Steam are a major energy consumer. Optimising process operating conditions can considerably improve turbine water rate, which in turn will significantly reduce energy requirement. Various operating parameters affect con...
Optimal Placement of Relay Nodes in Multi-pair Co-Operative Network to Increase System Capacity in WSN
With the advancement of technology the usage of wireless sensor network are increasing day by day. There are two types of sensor networks: Single tiered and multi-tiered [5]. In single tired sensor network there i...
Mobile Ad Hoc Networks Security: Challenges and solutions
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose...
Ecologıcal Impact Of Urban Forests (Example Of Kastamonu Urban Forest)
Despite the attractive advantages of life, because of agricultural and industrial developments, and also the growing population, in the cities which took place of rapid urbanization and which have irregular struct...