|Communications on Applied Electronics|
|Foundation of Computer Science (FCS), NY, USA|
|Volume 5 - Number 1|
|Year of Publication: 2016|
|Authors: Vijay Kumar, Manju Bala, Pooja Choudhary|
Vijay Kumar, Manju Bala, Pooja Choudhary . Implementation of Secure Data Mining Approach in Cloud using Image Encryption. Communications on Applied Electronics. 5, 1 ( May 2016), 17-21. DOI=10.5120/cae2016652186
The continuous development of cloud computing is giving way to more cloud services, due to which security of cloud services, especially data privacy protection, becomes more critical. This research work explores the basic features of data mining techniques in cloud computing and securing the data. The status of the development of cloud computing security, the data privacy analysis, security auditing, data monitoring and other challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The implementation of data mining techniques through cloud computing encourages the users to extract meaningful hidden predictive information from virtually integrated data warehouse that reduces the costs of storage and infrastructure.