Data Trawling and Security Strategies
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: The amount of data in the world seems increasing and computers make it easy to save the data. Companies offer data storage by providing cloud services and the amount of data being stored in these servers is increasing rapidly. In data mining, the data is stored electronically and the search is automated or at least augmented by computer. As the volume of data increases, inexorably, the proportion of it that people understand decreases alarmingly. This paper presents the data leakage problem arises because the services like Facebook and Google store all your data unencrypted on their servers, making it easy for them, or governments and hackers, to monitor the data.
Authors and Affiliations
Aishwarya Asesh, G V Karthik
Displaying All Bangla Compound Letters & Alphabets By 32-Segment
Abstract: Different approaches have been proposed for representing Bangla and English alphabets and numerals by segment display. But there is no complete and accurate scheme has been done yet for Bangla compound...
Digital Image Compression using Hybrid Transform with Kekre Transform and Other Orthogonal Transforms
This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent  ...
Protection of Direct and Indirect Discrimination using Prevention Methods
Along with privacy, discrimination is a very important issue when considering the legal and ethical aspects of data mining. It is more than observable that the majority people do not want to be discriminated &nbs...
Enhancement of Security Levels Using a Secure Intrusion Detection System in Manets
Abstract: A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies .A Security is an important issue for ad hoc networks, especiall...
Distinct Revocable Data Hiding In Ciphered Image
Abstract: This scheme proposes a secure and authenticated reversible data hiding in cipher images.Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can bereversibl...