Improving Cloud Security Using Data Mining

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). It does offer great level of flexibility but this advantage comes  with a drawback. With increase in sharing of data over web there is an increase in possibility of data being  subjected to malicious attacks. Attacker/Provider can extract sensitive information by analyzing the client data  over a long period of time. Hence the privacy and security of the user’s data is compromised. In this paper we  propose an efficient distributed architecture to mitigate the risks.

Authors and Affiliations

Srishti Sharma

Keywords

Related Articles

Risk Minimization in Agribusiness using Soft Computing Technique

Abstract: India is an agriculture based country and farmer community is the backbone of the agriculture sector. Agribusiness is one of the important segments of agriculture sector. This paper aims to minimize agribusine...

 A Comparative Study of Two Microprocessor Based Distributed Systems: Intel Xeon and AMD Opteron

 Abstract: In this article, we draw a comparative study of microprocessor–based distributed systems, using the two major processors; Intel and AMD. Although the philosophy of their microarchitecture is the same, the...

Neural Networks Optimization, Using the Genetic Algorithm

Abstract: There are many ways in neural networks optimization by genetic algorithm. One of the optimization methods is the neural networks repetition. The main idea of this method is that the model is developed at first...

 Comparative Study of PEGASIS Protocols inWireless Sensor Network

Abstract: The area of Wireless Sensor Networks (WSNs) is one of the fast growing and emerging field in the scientific and engineering world. It is an ad-hoc network that consists of small nodes with sensing, computing an...

 Enhanced Security Algorithm using Hybrid Encryption and ECC

Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanc...

Download PDF file
  • EP ID EP126169
  • DOI -
  • Views 70
  • Downloads 0

How To Cite

Srishti Sharma (2014).  Improving Cloud Security Using Data Mining. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 66-69. https://europub.co.uk/articles/-A-126169