Preview

Survey on Secure Data mining in Cloud Computing

Better Essays
Open Document
Open Document
3913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Survey on Secure Data mining in Cloud Computing
Survey on Secure Data mining in Cloud Computing
U.Venkateshwarlu #1
#1 M.Tech,Computer Science and Engineering , JNTUH
Hyderabad, AP, INDIA
1 uvenkatesh905@gmail.com

Puppala Priyanka *2
2 M.Tech,Computer Science and Engineering , JNTUH
Hyderabad, AP, INDIA
2 priya.puppala9@gmail.com
Abstract— Data mining techniques are very important in the cloud computing paradigm. The integration of data mining techniques with Cloud computing allows the users to extract useful information from a data warehouse that reduces the costs of infrastructure and storage. Security and privacy of user’s data is a big concern when data mining is used with cloud computing. Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. An important security concern is privacy attacks based on data mining involving analyzing data over a long period to extract valuable information. In this dissertation our main objective is to provide information with the help of which we can make data secure from unauthorized users. As uses of data come on front we have to face concept of data mining. Data Mining is a field where accuracy matters a lot. Data mining techniques and applications are very much needed in the cloud computing paradigm. The implementation of data mining techniques through Cloud computing will allow the users to retrieve meaningful information from virtually integrated data warehouse that reduces the costs of infrastructure and storage.
Keywords— Cloud Computing, Data mining, privacy preserving.
I. Introduction
The Internet is becoming a surprisingly vital tool in our daily life, both professional and personal, as its users are becoming more numerous. The Cloud, as it is often referred to, involves using computing resources – hardware and software – that are delivered as a service over the Internet. At an equally significant extent in recent years, data mining techniques have evolved and

You May Also Find These Documents Helpful

  • Powerful Essays

    [4] Storage Conference. The Hadoop Distributed File System http://storageconference.org/ 2010/ Papers/ MSST/Shvachko.pdf [5] A Tutorial on Clustering Algorithms. K-Means Clustering http://home.dei.polimi.it/matteucc/ Clustering/ tutorial_html/kmeans.html [6] International Journal of Computer Science Issues. Setting up of an Open Source based Private Cloud http://ijcsi.org/papers/IJCSI-8-3-1-354-359.pdf [7] Eucalyptus. Modifying a prepackaged image http://open.eucalyptus.com/participate/wiki/modifyi ng-prepackaged-image [8] Michael G. Noll. Running Hadoop On Ubuntu Linux (Single-Node Cluster) http://www.michaelnoll.com/tutorials/running-hadoop-on-ubuntu-linuxsingle-node-cluster/ [9] 8K Miles Cloud Solutions. Hadoop: CDH3 – Cluster (Fully-Distributed) Setup http://cloudblog.8kmiles.com/2011/12/08/hadoopcdh3-cluster-fully-distributed-setup/ [10] Apache Mahout. Creating Vectors from Text https://cwiki.apache.org/MAHOUT/creatingvectors-from-text.html…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Cloud computing is a technology model that allows users to access and obtain delivery of information and resources over the Internet. This model generates all of the features required to support the complete cycle of constructing and delivering web-based applications. Nowadays, more and more companies are investing in the development of this powerful and valuable technology which has revolutionized the way of doing business, selling and marketing products. “It is a simple idea with great impact” that has evolution thanks to the faster and faster Internet connections, as we will discuss later on this paper.…

    • 3864 Words
    • 16 Pages
    Powerful Essays
  • Best Essays

    Data mining is used in numerous applications, particularly business related endeavors such as market segmentation, customer churn, fraud detection, direct marketing, interactive marketing, market basket analysis and trend analysis. However, since the 1993 World Trade Center bombing and the terrorist attacks of September 11, data mining has increasingly been used in homeland security efforts.…

    • 4628 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    References: [1] R. Agrawal, T. Imielinski, A. Swami, Proceeding of the ACM SIGMOD Conference on Management of Data, 1993. [2] R. Agrawal, R. Srikant. The International Conference on Very Large Databases, 1994. [3] I. H. Witten, E. Frank, Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, chapter 8, http://www.cs.waikato.ac.nz, 2000. [4] A. Roberts, Guide to WEKA, http://www.comp.leeds.ac.uk/andyr, 2005. [5] M. Levy, B. Weitz, Retailing Management, McGraw-Hill, New York, 2001.…

    • 2113 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Best Essays

    It Essay - Data Mining

    • 1998 Words
    • 8 Pages

    Dharminder, K. (2011). Rise of Data Mining: Current and Future Application Areas. International Journal of Computer Science Issues, 8(5), 256-260. Retrieved November 7, 2012, from http://www.ijcsi.org/papers/IJCSI-8-5-1-256-260.pdf…

    • 1998 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Many companies keep sensitive personal information about customers or employees in their files or on their network. Those information move fast through the systems and make easier for organizations to provide efficient and effect full service to the customers. Security of the information is one of the most concern aspects in information systems as it has become a major threat embedded with the information systems today. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. In this article, it describes the data security, data breaches and as well as the existing solutions for prevent the security issues and vulnerabilities.…

    • 1700 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Cloud computing helps in bringing together complex IT documents in a small number of places, which can be managed easily. Although cloud computing has its advantages such as simplicity and cost, there are certain security concerns which have been brought about by users, as it involves storing important, and critical data in a shared and public environment. The issues on security concerns can be explained as follows:…

    • 2014 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    [1] Bhasin, M. L. (2006). The Chartered Accountant, Banking and Finance, Data Mining: A Competitive Tool in the Banking. Oman.…

    • 2794 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Data Mining

    • 2354 Words
    • 10 Pages

    Before examining the benefits of data mining, it is important to understand what data mining is exactly. Data mining is defined as “a process that uses statistical, mathematical, artificial intelligence and machine-learning techniques to extract and identify useful information and subsequent knowledge from large databases, including data warehouses” (Turban & Volonino, 2011). The information identified using data mining includes patterns indicating trends,…

    • 2354 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Almost every organization today is recognizing the importance of utilizing data mining in their businesses. Data mining is emerging as a very useful tool for providing valuable information from large databases and enabling managers and business executives to make hard core decisions in a much easier and effective manner. Not only data mining helps to extract useful knowledge from large amount of data but it is also helping in declining various costs like cost of computation power and also reduces time for decision making and knowledge discovery.…

    • 2917 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    data mining IEEE format

    • 10012 Words
    • 41 Pages

    Abstract: This topic is mainly used by a number of data mining techniques, such as clustering, nearest neighbor classification, and anomaly detection. And it can also include the data mining applications.In this paper we have focused a variety of techniques, approaches and different areas of the research which are helpful and marked as the important field of data mining Technologies. As we are aware that many MNC’s and large organizations are operated in different places of the different countries. Each place of operation may generate large volumes of data. Corporate decision makers require access from all such sources and take strategic decisions. In an uncertain and highly competitive business environment, the value of strategic information systems such as these are easily recognized however in today’s business environment, efficiency or speed is not the only key for competitiveness. This type of huge amount of data’s is available in the form of tera- to peta-bytes which has drastically changed in the areas of science and engineering.…

    • 10012 Words
    • 41 Pages
    Powerful Essays

Related Topics