Call for Paper
CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.
Implementation of Secure Data Mining Approach in Cloud using Image Encryption
Vijay Kumar, Manju Bala and Pooja Choudhary. Implementation of Secure Data Mining Approach in Cloud using Image Encryption. Communications on Applied Electronics 5(1):17-21, May 2016. BibTeX
@article{10.5120/cae2016652186, author = {Vijay Kumar and Manju Bala and Pooja Choudhary}, title = {Implementation of Secure Data Mining Approach in Cloud using Image Encryption}, journal = {Communications on Applied Electronics}, issue_date = {May 2016}, volume = {5}, number = {1}, month = {May}, year = {2016}, issn = {2394-4714}, pages = {17-21}, numpages = {5}, url = {http://www.caeaccess.org/archives/volume5/number1/587-2016652186}, doi = {10.5120/cae2016652186}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
The continuous development of cloud computing is giving way to more cloud services, due to which security of cloud services, especially data privacy protection, becomes more critical. This research work explores the basic features of data mining techniques in cloud computing and securing the data. The status of the development of cloud computing security, the data privacy analysis, security auditing, data monitoring and other challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The implementation of data mining techniques through cloud computing encourages the users to extract meaningful hidden predictive information from virtually integrated data warehouse that reduces the costs of storage and infrastructure.
References
- UppunuthulaVenkateshwarlu, PuppalaPriyanka, “Survey on Secure Data mining in Cloud Computing”, ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print), International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol. 2, Issue 2, Ver. 1 (April - June 2014)
- Juan Li1, Pallavi Roy, Samee U. Khan, Lizhe Wang, Yan Bai, “Data Mining Using Clouds: An Experimental Implementation of Apriori over MapReduce”, The 12th IEEE International Conference on Scalable Computing and Communication, December, 2012.
- Pramod Kumar Joshi1 and Sadhana Rana, “Era of Cloud Computing”, High Performance Architecture and Grid Computing Communications in Computer and Information Science, Vol. 169,, pp 1-8, ISSN 1865-0929, Springer-Verlag Berlin Heidelberg 2011
- EmanElghoniemy, OthmaneBouhali, Hussein Alnuweiri, “Resource Allocation and Scheduling in loud Computing”, DOI: 978-1-4673-0009-4/12, IEEE 2012
- Rabi Prasad Padhy, ManasRanjanPatra, Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”, International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 1, No. 2, December 2011
- Prof. G. Thippa Reddy, Prof. K. Sudheer , Prof. K Rajesh, Prof. K. Lakshmanna, “Employing Data Mining On Highly Secured Private Clouds For Implementing A Security-As a- Service Framework”, Journal of Theoretical and Applied Information Technology, Vol. 59 No.2, ISSN: 1992-8645, January20, 2014
- Ramadhan Mstafa1, Christian Bach, “Information ,Hiding in Images Using Steganography Techniques”, ASEE Northeast Section Conference Norwich University,Reviewed Paper, March 14-16, 2013
- Cong Wang, Qian Wang, and KuiRen,Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing”, Quality of Service, 2009. IWQoS. 17th International Workshop, ISSN : 1548-615X, DOI: 10.1109/IWQoS.2009.5201385, IEEE, July 13-15, 2009
- C.P.Sumathi1, T.Santanam2 and G.Umamaheswari, “A Study of Various Steganographic Techniques Used for Information Hiding”, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6, December 2013
- Monjur Ahmed1 and Mohammad Ashraf Hossain, “Cloud computing and security issues in the cloud” , International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014
- Lingjuan Li Min Zhang, “ The Strategy of Mining Association Rule Based on Cloud Computing”,Business Computing and Global Informatization (BCGIN), International Conference, DOI: 10.1109/BCGIn.2011.125, IEEE, July29-31, 2011
- Zhangn Chun-sheng Li yan, “Extension of Local Association Rules Mining Algorithm Based on Apriori Algorithm”, DOI: 978-1-4799-3279-5 /14IEEE, 2014
- B. Kamala, “A study on integrated approach of data mining and cloud mining”, International Journal of Advances In Computer Science and Cloud Computing, ISSN: 2321-4058 Vol. 1, Issue- 2, Nov-2013
- Zeba Qureshi1, Jaya Bansal2, Sanjay Bansal3, “A Survey on Association Rule Mining in Cloud Computing”, International Journal of Emerging Technology and Advanced Engineering , ISSN 2250-2459, Vol. 3, Issue 4, April 2013
- Jiawei Han, Hong Cheng, Dong Xin, “Xifeng Yan Frequent pattern mining: current status and future”, , Data Min Knowl Disc 15:55–86, DOI 10.1007/s10618-006-0059-1, 2007
- Usama Fayyad, Gregory Piatetsky-Shapiro, and Padhraic Smyth, “From Data Mining to Knowledge Discovery in Databases”, American Association for Artificial Intelligence, 0738-4602-1996
- VahidAshktorab, Seyed Reza Taghizadeh , “Security Threats and Countermeasures in Cloud computing”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 1, Issue 2, ISSN 2319 – 4847, October 2012
- GarimaSaini Naveen Sharma, “Triple Security of Data in Cloud Computing”, International Journal of Scientific and Research Publications, Vol. 4, Issue 6, ISSN 2250-3153, June 2014
- Jijo.S. Nair, BholaNath Roy, “ Data Security in Cloud”, International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005, National Conference on Architecture, Software system and Green computing
- T.V. Mahendra , N.Deepika , N.KeasavaRao, “Data Mining for High Performance Data Cloud using Association Rule Mining”, International Journal of Advanced Research in Computer Science and Software Engineering,Vol. 2, Issue 1, ISSN: 2277 128X, January 2012
- Sneha Arora1, Sanyam Anand2, “A New Approach for Image Steganography using Edge Detection Method”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 3, ISSN (Print) : 2320 – 9798 ISSN (Online): 2320 – 9801, May 2013
Keywords
Cloud Computing, data security, Knowledge Discovery