Realisation of Resourceful Data Mining Services Using Cloud Computing
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 7
Abstract
Data security and access control are the most challenging research work going on, at present, in cloud computing. This is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area provided by the service providers. The service providers must have a suitable way to protect their client’s sensitive data, especially to protect the data from unauthorized access. A general method of information privacy protection is to store the client’s data in encrypted form. If the cloud system is in charge for both storage and encryption/decryption of the data, the system administrators may concurrently obtain encrypted data and the decryption keys. This will let them to use the information of the client devoid of any permission. This will lead to the risk of vulnerable information disclose and the method concerned with storage and encryption/decryption is expensive too. Hence, to overcome these problems, a model (cloud server) has been proposed in this paper which accepts only those data which are required in an encoded form, performs the service opted by the client and sends the result in the encoded format to be understood by the respective client. This paper also contains the implementation results and the benefit analysis of the proposed system.
Authors and Affiliations
Ankita Naskar , Prof. Mrs. Monika R. Mishra
An Extensive Study on the Future of Modeling in Software Development
In recent years, software modeling realized much attention in the field of software research and development due to demonstrating the capability of decreases time and cost of software development and also improves overal...
Nodes distribution and selection of accurate mobility Framework to systematically analyze its impact for improving performance of routing protocols for mobile ad hoc networks through Simulations
Research on mobile ad hoc routing protocols performance based on simulation relies on choice of realistic mobility model. However, in the absence of realistic data movement, Synthetic models may be used for generating mo...
Impulse denoising using Hybrid Algorithm
Many real time images facing a problem of salt and pepper noise contaminated,due to poor illumination and environmental factors. Many filters and algorithms are used to remove salt and pepper noise from the image, but it...
Application Based Utility Adaptation with Prioritized Weight Assignment Strategy for Minimizing Delay in Multimedia Applications
The aim of this paper is to propose a joint cross-layer approach between application layer and MAC layer for enhancing Quality of Service (QoS) for multimedia applications. Bandwidth adaptation scheme based on applicatio...
Restoration of Normal Frequency Affected by Small Load Variations Through HVDC Link Using Neuro-Fuzzy Approach
HVDC power transmission is coming up with merits to replace the EHV-AC systems. The controller inverter operation can successfully regulate the power in HVDC link leading to fulfillment of power demand in A.C. networks c...