Enhancing Cloud Computing Security by Using Pixel Key Pattern
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.14, No. 7)Publication Date: 2015-05-21
Authors : Randeep Kaur; Jagroop Kaur;
Page : 5919-5928
Keywords : Cloud Computing; Cloud Security; Confidentiality; Security Issues; Zones; Grouping.;
Abstract
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems.??
Other Latest Articles
- To investigate the effect of Mobile IP on the performance of VANET through realistic channel conditions.
- To investigate the Temporal and Spatial correlation behavioral characteristics of MIMO fading channels
- CLOUD COMPUTING SECURITY AND DATA PROTECTION: A REVIEW
- Visualizing text similarities from a graph-based SOM
- Comparative Study on Sybil Attack Detection Schemes
Last modified: 2016-06-29 16:11:55