Abstract

Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems. Â

Highlights

  • Cloud Computing is one of the biggest technology advancement in recent times

  • To storing data in the cloud instead of on their own devices and it making ubiquitous data access possible. They can run their applications on much more powerful cloud computing platforms with software deployed in the cloud which mitigating the users burden of full software installation and continual upgrade on their local devices

  • These factors include many aspects as: external dimension, internal dimension, technology dimension, and execution dimension. These factors are used to purpose a new scheme, which is used to overcome the various problems in cloud computing that are related to the security

Read more

Summary

INTRODUCTION

Cloud Computing is one of the biggest technology advancement in recent times. It has taken computing in initial to the level. Cloud computing uses the internet and the central remote servers to support different data and applications. Cloud computing incorporates the infrastructure, platform, and software as services These service providers rent data center hardware and software to deliver storage and computing services through the Internet. Limited control and flexibility: In the cloud computing, the applications and services run on remote, third party virtual environments, companies. Disaster Recovery and Business Continuity Tenants and users require confidence that their operations and services will continue if the cloud provider’s production environment is subject to a disaster. Transparency When a cloud provider does not expose details of their internal policy or technology implementation, tenants or users must trust the cloud provider’s security claims. Hardware, and networking equipment are subject to unearthing of new vulnerabilities, by applying layered security and well-conceived operational processes, a cloud may be protected from common types of attack even if some of its components are inherently vulnerable

RELATED WORK
MOTIVATION FOR RESEARCH
OBJECTIVES
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.