Improving Cloud Security Using Data Mining

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). It does offer great level of flexibility but this advantage comes  with a drawback. With increase in sharing of data over web there is an increase in possibility of data being  subjected to malicious attacks. Attacker/Provider can extract sensitive information by analyzing the client data  over a long period of time. Hence the privacy and security of the user’s data is compromised. In this paper we  propose an efficient distributed architecture to mitigate the risks.

Authors and Affiliations

Srishti Sharma

Keywords

Related Articles

 BER Analysis ofImpulse Noise inOFDM System UsingLMS,NLMS&RLS

 Abstract:Orthogonal Frequency Division Multiplexing (OFDM) scheme is also used as a digital multi carriermodulation method .Alarge number of closely spaced orthogonal sub-carrier signals are used to carry data onse...

 A Survey On Data Mining Techniques To Find Out Type Of Heart Attack

 Heart disease is a major cause of morbidity and mortality in present society. Medicinal identification is extremely important but complicated task that should be performed precisely and proficiently. Although su...

 Performance Analysis of Aodv, Dsdv, Dsr and Lar Routing Protocols In Manet- A Review

 Abstract: Mobile ad Hoc network is a collection of mobile nodes that communicate with each other using wireless links. A routing protocol is used to discover routes between nodes in order to facilitate communicatio...

 Secure Intranet Voting System for Students’ Union Elections inNigerian Tertiary Institutions

 Abstract: In virtually all tertiary institutions of Nigeria, electronic voting technologies for the conduct ofstudents’ union elections are yet to be implemented as a replacement for the existent manual votingtechn...

Image Reconstruction of Tumor Brain Cells

Image reconstruction techniques are used to create 2-D and 3-D images from sets of 1-D projections. These reconstruction techniques form the basis for common imaging modalities such as CT, MRI, and PET, and they are usef...

Download PDF file
  • EP ID EP126169
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Srishti Sharma (2014).  Improving Cloud Security Using Data Mining. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 66-69. https://europub.co.uk./articles/-A-126169