Improving Cloud Security Using Data Mining
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). It does offer great level of flexibility but this advantage comes with a drawback. With increase in sharing of data over web there is an increase in possibility of data being subjected to malicious attacks. Attacker/Provider can extract sensitive information by analyzing the client data over a long period of time. Hence the privacy and security of the user’s data is compromised. In this paper we propose an efficient distributed architecture to mitigate the risks.
Authors and Affiliations
Srishti Sharma
Risk Minimization in Agribusiness using Soft Computing Technique
Abstract: India is an agriculture based country and farmer community is the backbone of the agriculture sector. Agribusiness is one of the important segments of agriculture sector. This paper aims to minimize agribusine...
A Comparative Study of Two Microprocessor Based Distributed Systems: Intel Xeon and AMD Opteron
Abstract: In this article, we draw a comparative study of microprocessor–based distributed systems, using the two major processors; Intel and AMD. Although the philosophy of their microarchitecture is the same, the...
Neural Networks Optimization, Using the Genetic Algorithm
Abstract: There are many ways in neural networks optimization by genetic algorithm. One of the optimization methods is the neural networks repetition. The main idea of this method is that the model is developed at first...
Comparative Study of PEGASIS Protocols inWireless Sensor Network
Abstract: The area of Wireless Sensor Networks (WSNs) is one of the fast growing and emerging field in the scientific and engineering world. It is an ad-hoc network that consists of small nodes with sensing, computing an...
Enhanced Security Algorithm using Hybrid Encryption and ECC
Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanc...