Realisation of Resourceful Data Mining Services Using Cloud Computing
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 7
Abstract
Data security and access control are the most challenging research work going on, at present, in cloud computing. This is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area provided by the service providers. The service providers must have a suitable way to protect their client’s sensitive data, especially to protect the data from unauthorized access. A general method of information privacy protection is to store the client’s data in encrypted form. If the cloud system is in charge for both storage and encryption/decryption of the data, the system administrators may concurrently obtain encrypted data and the decryption keys. This will let them to use the information of the client devoid of any permission. This will lead to the risk of vulnerable information disclose and the method concerned with storage and encryption/decryption is expensive too. Hence, to overcome these problems, a model (cloud server) has been proposed in this paper which accepts only those data which are required in an encoded form, performs the service opted by the client and sends the result in the encoded format to be understood by the respective client. This paper also contains the implementation results and the benefit analysis of the proposed system.
Authors and Affiliations
Ankita Naskar , Prof. Mrs. Monika R. Mishra
MICROCONTROLLER PIN CONFIGURATION TOOL
Configuring the micro controller with large number of pins is tedious. Latest Infine on microcontroller contains more than 200 pins and each pin has classes of signals. Therefore the complexity of the microcontroller is...
Performance Evaluation and Optimization of TCP Parameters over Frame Relay Network
The TCP window size value, which is contained in the window size field of the TCP segment is a very important TCP Parameter. The window size value determines the number of bytes of data that can be sent before an acknowl...
Iris recognition based on subspace analysis
Biometrics deals with the uniqueness of an individual arising from their physiological or behavioral characteristics for the purpose of personal identification. Among many biometrics techniques, iris recognition is one o...
DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
Frequent pattern mining in databases plays a vital role in many data mining tasks like classification, sequential patters, clustering, association rules analysis etc. There are numerous mining algorithms for finding asso...
A Novel Approach for English to South Dravidian Language Statistical Machine Translation System
Development of a well fledged bilingual machine translation (MT) system for any two natural languages with limited lectronic resources and tools is a challenging and demanding task. This paper presents the development o...