CFP last date
02 December 2024
Call for Paper
January Edition
CAE solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 02 December 2024

Submit your paper
Know more
Reseach Article

Implementation of Secure Data Mining Approach in Cloud using Image Encryption

by Vijay Kumar, Manju Bala, Pooja Choudhary
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 1
Year of Publication: 2016
Authors: Vijay Kumar, Manju Bala, Pooja Choudhary
10.5120/cae2016652186

Vijay Kumar, Manju Bala, Pooja Choudhary . Implementation of Secure Data Mining Approach in Cloud using Image Encryption. Communications on Applied Electronics. 5, 1 ( May 2016), 17-21. DOI=10.5120/cae2016652186

@article{ 10.5120/cae2016652186,
author = { Vijay Kumar, Manju Bala, Pooja Choudhary },
title = { Implementation of Secure Data Mining Approach in Cloud using Image Encryption },
journal = { Communications on Applied Electronics },
issue_date = { May 2016 },
volume = { 5 },
number = { 1 },
month = { May },
year = { 2016 },
issn = { 2394-4714 },
pages = { 17-21 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume5/number1/587-2016652186/ },
doi = { 10.5120/cae2016652186 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:55:17.183250+05:30
%A Vijay Kumar
%A Manju Bala
%A Pooja Choudhary
%T Implementation of Secure Data Mining Approach in Cloud using Image Encryption
%J Communications on Applied Electronics
%@ 2394-4714
%V 5
%N 1
%P 17-21
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The continuous development of cloud computing is giving way to more cloud services, due to which security of cloud services, especially data privacy protection, becomes more critical. This research work explores the basic features of data mining techniques in cloud computing and securing the data. The status of the development of cloud computing security, the data privacy analysis, security auditing, data monitoring and other challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The implementation of data mining techniques through cloud computing encourages the users to extract meaningful hidden predictive information from virtually integrated data warehouse that reduces the costs of storage and infrastructure.

References
  1. UppunuthulaVenkateshwarlu, PuppalaPriyanka, “Survey on Secure Data mining in Cloud Computing”, ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print), International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol. 2, Issue 2, Ver. 1 (April - June 2014)
  2. Juan Li1, Pallavi Roy, Samee U. Khan, Lizhe Wang, Yan Bai, “Data Mining Using Clouds: An Experimental Implementation of Apriori over MapReduce”, The 12th IEEE International Conference on Scalable Computing and Communication, December, 2012.
  3. Pramod Kumar Joshi1 and Sadhana Rana, “Era of Cloud Computing”, High Performance Architecture and Grid Computing Communications in Computer and Information Science, Vol. 169,, pp 1-8, ISSN 1865-0929, Springer-Verlag Berlin Heidelberg 2011
  4. EmanElghoniemy, OthmaneBouhali, Hussein Alnuweiri, “Resource Allocation and Scheduling in loud Computing”, DOI: 978-1-4673-0009-4/12, IEEE 2012
  5. Rabi Prasad Padhy, ManasRanjanPatra, Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”, International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 1, No. 2, December 2011
  6. Prof. G. Thippa Reddy, Prof. K. Sudheer , Prof. K Rajesh, Prof. K. Lakshmanna, “Employing Data Mining On Highly Secured Private Clouds For Implementing A Security-As a- Service Framework”, Journal of Theoretical and Applied Information Technology, Vol. 59 No.2, ISSN: 1992-8645, January20, 2014
  7. Ramadhan Mstafa1, Christian Bach, “Information ,Hiding in Images Using Steganography Techniques”, ASEE Northeast Section Conference Norwich University,Reviewed Paper, March 14-16, 2013
  8. Cong Wang, Qian Wang, and KuiRen,Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing”, Quality of Service, 2009. IWQoS. 17th International Workshop, ISSN : 1548-615X, DOI: 10.1109/IWQoS.2009.5201385, IEEE, July 13-15, 2009
  9. C.P.Sumathi1, T.Santanam2 and G.Umamaheswari, “A Study of Various Steganographic Techniques Used for Information Hiding”, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6, December 2013
  10. Monjur Ahmed1 and Mohammad Ashraf Hossain, “Cloud computing and security issues in the cloud” , International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014
  11. Lingjuan Li Min Zhang, “ The Strategy of Mining Association Rule Based on Cloud Computing”,Business Computing and Global Informatization (BCGIN), International Conference, DOI: 10.1109/BCGIn.2011.125, IEEE, July29-31, 2011
  12. Zhangn Chun-sheng Li yan, “Extension of Local Association Rules Mining Algorithm Based on Apriori Algorithm”, DOI: 978-1-4799-3279-5 /14IEEE, 2014
  13. B. Kamala, “A study on integrated approach of data mining and cloud mining”, International Journal of Advances In Computer Science and Cloud Computing, ISSN: 2321-4058 Vol. 1, Issue- 2, Nov-2013
  14. Zeba Qureshi1, Jaya Bansal2, Sanjay Bansal3, “A Survey on Association Rule Mining in Cloud Computing”, International Journal of Emerging Technology and Advanced Engineering , ISSN 2250-2459, Vol. 3, Issue 4, April 2013
  15. Jiawei Han, Hong Cheng, Dong Xin, “Xifeng Yan Frequent pattern mining: current status and future”, , Data Min Knowl Disc 15:55–86, DOI 10.1007/s10618-006-0059-1, 2007
  16. Usama Fayyad, Gregory Piatetsky-Shapiro, and Padhraic Smyth, “From Data Mining to Knowledge Discovery in Databases”, American Association for Artificial Intelligence, 0738-4602-1996
  17. VahidAshktorab, Seyed Reza Taghizadeh , “Security Threats and Countermeasures in Cloud computing”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 1, Issue 2, ISSN 2319 – 4847, October 2012
  18. GarimaSaini Naveen Sharma, “Triple Security of Data in Cloud Computing”, International Journal of Scientific and Research Publications, Vol. 4, Issue 6, ISSN 2250-3153, June 2014
  19. Jijo.S. Nair, BholaNath Roy, “ Data Security in Cloud”, International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005, National Conference on Architecture, Software system and Green computing
  20. T.V. Mahendra , N.Deepika , N.KeasavaRao, “Data Mining for High Performance Data Cloud using Association Rule Mining”, International Journal of Advanced Research in Computer Science and Software Engineering,Vol. 2, Issue 1, ISSN: 2277 128X, January 2012
  21. Sneha Arora1, Sanyam Anand2, “A New Approach for Image Steganography using Edge Detection Method”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 3, ISSN (Print) : 2320 – 9798 ISSN (Online): 2320 – 9801, May 2013
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing data security Knowledge Discovery