Preview

Survey on Secure Data mining in Cloud Computing

Better Essays
Open Document
Open Document
3913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Survey on Secure Data mining in Cloud Computing
Survey on Secure Data mining in Cloud Computing
U.Venkateshwarlu #1
#1 M.Tech,Computer Science and Engineering , JNTUH
Hyderabad, AP, INDIA
1 uvenkatesh905@gmail.com

Puppala Priyanka *2
2 M.Tech,Computer Science and Engineering , JNTUH
Hyderabad, AP, INDIA
2 priya.puppala9@gmail.com
Abstract— Data mining techniques are very important in the cloud computing paradigm. The integration of data mining techniques with Cloud computing allows the users to extract useful information from a data warehouse that reduces the costs of infrastructure and storage. Security and privacy of user’s data is a big concern when data mining is used with cloud computing. Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. An important security concern is privacy attacks based on data mining involving analyzing data over a long period to extract valuable information. In this dissertation our main objective is to provide information with the help of which we can make data secure from unauthorized users. As uses of data come on front we have to face concept of data mining. Data Mining is a field where accuracy matters a lot. Data mining techniques and applications are very much needed in the cloud computing paradigm. The implementation of data mining techniques through Cloud computing will allow the users to retrieve meaningful information from virtually integrated data warehouse that reduces the costs of infrastructure and storage.
Keywords— Cloud Computing, Data mining, privacy preserving.
I. Introduction
The Internet is becoming a surprisingly vital tool in our daily life, both professional and personal, as its users are becoming more numerous. The Cloud, as it is often referred to, involves using computing resources – hardware and software – that are delivered as a service over the Internet. At an equally significant extent in recent years, data mining techniques have evolved and

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    [4] Storage Conference. The Hadoop Distributed File System http://storageconference.org/ 2010/ Papers/ MSST/Shvachko.pdf [5] A Tutorial on Clustering Algorithms. K-Means Clustering http://home.dei.polimi.it/matteucc/ Clustering/ tutorial_html/kmeans.html [6] International Journal of Computer Science Issues. Setting up of an Open Source based Private Cloud http://ijcsi.org/papers/IJCSI-8-3-1-354-359.pdf [7] Eucalyptus. Modifying a prepackaged image http://open.eucalyptus.com/participate/wiki/modifyi ng-prepackaged-image [8] Michael G. Noll. Running Hadoop On Ubuntu Linux (Single-Node Cluster) http://www.michaelnoll.com/tutorials/running-hadoop-on-ubuntu-linuxsingle-node-cluster/ [9] 8K Miles Cloud Solutions. Hadoop: CDH3 – Cluster (Fully-Distributed) Setup http://cloudblog.8kmiles.com/2011/12/08/hadoopcdh3-cluster-fully-distributed-setup/ [10] Apache Mahout. Creating Vectors from Text https://cwiki.apache.org/MAHOUT/creatingvectors-from-text.html…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Cloud computing is a technology model that allows users to access and obtain delivery of information and resources over the Internet. This model generates all of the features required to support the complete cycle of constructing and delivering web-based applications. Nowadays, more and more companies are investing in the development of this powerful and valuable technology which has revolutionized the way of doing business, selling and marketing products. “It is a simple idea with great impact” that has evolution thanks to the faster and faster Internet connections, as we will discuss later on this paper.…

    • 3864 Words
    • 16 Pages
    Powerful Essays
  • Best Essays

    Data mining is used in numerous applications, particularly business related endeavors such as market segmentation, customer churn, fraud detection, direct marketing, interactive marketing, market basket analysis and trend analysis. However, since the 1993 World Trade Center bombing and the terrorist attacks of September 11, data mining has increasingly been used in homeland security efforts.…

    • 4628 Words
    • 19 Pages
    Best Essays
  • Best Essays

    It Essay - Data Mining

    • 1998 Words
    • 8 Pages

    Dharminder, K. (2011). Rise of Data Mining: Current and Future Application Areas. International Journal of Computer Science Issues, 8(5), 256-260. Retrieved November 7, 2012, from http://www.ijcsi.org/papers/IJCSI-8-5-1-256-260.pdf…

    • 1998 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Many companies keep sensitive personal information about customers or employees in their files or on their network. Those information move fast through the systems and make easier for organizations to provide efficient and effect full service to the customers. Security of the information is one of the most concern aspects in information systems as it has become a major threat embedded with the information systems today. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. In this article, it describes the data security, data breaches and as well as the existing solutions for prevent the security issues and vulnerabilities.…

    • 1700 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    [1] Bhasin, M. L. (2006). The Chartered Accountant, Banking and Finance, Data Mining: A Competitive Tool in the Banking. Oman.…

    • 2794 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Almost every organization today is recognizing the importance of utilizing data mining in their businesses. Data mining is emerging as a very useful tool for providing valuable information from large databases and enabling managers and business executives to make hard core decisions in a much easier and effective manner. Not only data mining helps to extract useful knowledge from large amount of data but it is also helping in declining various costs like cost of computation power and also reduces time for decision making and knowledge discovery.…

    • 2917 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    data mining IEEE format

    • 10012 Words
    • 41 Pages

    Abstract: This topic is mainly used by a number of data mining techniques, such as clustering, nearest neighbor classification, and anomaly detection. And it can also include the data mining applications.In this paper we have focused a variety of techniques, approaches and different areas of the research which are helpful and marked as the important field of data mining Technologies. As we are aware that many MNC’s and large organizations are operated in different places of the different countries. Each place of operation may generate large volumes of data. Corporate decision makers require access from all such sources and take strategic decisions. In an uncertain and highly competitive business environment, the value of strategic information systems such as these are easily recognized however in today’s business environment, efficiency or speed is not the only key for competitiveness. This type of huge amount of data’s is available in the form of tera- to peta-bytes which has drastically changed in the areas of science and engineering.…

    • 10012 Words
    • 41 Pages
    Powerful Essays
  • Better Essays

    Data Mining

    • 2354 Words
    • 10 Pages

    Before examining the benefits of data mining, it is important to understand what data mining is exactly. Data mining is defined as “a process that uses statistical, mathematical, artificial intelligence and machine-learning techniques to extract and identify useful information and subsequent knowledge from large databases, including data warehouses” (Turban & Volonino, 2011). The information identified using data mining includes patterns indicating trends,…

    • 2354 Words
    • 10 Pages
    Better Essays
  • Better Essays

    Abstract— The need for secure data storage has become a necessity of our time. Medical records, financial records, and legal information are all in need of secure storage. In the era of globalization and dynamic world economies, data outsourcing is inevitable. Security is major concern in data outsourcing environment, since data is under the custody of third party web servers. In present systems, third party can access and view data even though they are not authorized to do so, allowing the employee of the organization to update the database. This may lead to serious data theft, tampering or data leakages causing severe business loss to data owner. In this project we have proposed a novel solution to detect the database intrusion using Log Mining approach. Log files are unalterable files at runtime, automatically created by Web servers to have trace of the transactions performed on any web applications. Considering purchaser database at server-side and by comparing this with the transactions traced from log files, we can detect database tampering for any indifference found. Finally by using dynamic management view of SQL we can find who altered what data field and when. Our project thus provides hassle-free solution for server-side database intrusion.…

    • 2609 Words
    • 11 Pages
    Better Essays

Related Topics