International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 265

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.5 / 10


     

Survey Paper on Data Mining in Cloud Computing

Anuja R. Yeole, Poonam Borkar


Abstract: In this paper, we describe the privacy of data mining on cloud data that provide the information using which data can be secured from unauthorized users. Data mining is the component which is essential for domain of business. Cloud Computing can make possible model which is good for providers on demand to deploy the computing infrastructure and applications. It gives greater flexibility to allowed access to that enabling services and computing resources. But it has the risk of privacy of data user and security. In recent cloud process, client trust a care of single cloud provider with his data. In today's faster growing IT industry Cloud Computing possesses much more popularity because the Cloud providers believe that it is very easy to handle the data in the cloud ecosystem instead of normal websites in form of simple web pages. Every day the data seeking is being done by indefinite users hugely. Here due to large number of users seeking the data on every day basis there is a serious security interest to the cloud providers as well as the data providers who put their data on the cloud computing ecosystem.


Keywords: Data mining, cloud computing, security, privacy


Edition: Volume 4 Issue 3, March 2015


Pages: 2126 - 2128



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Anuja R. Yeole, Poonam Borkar, "Survey Paper on Data Mining in Cloud Computing", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 2126-2128, https://www.ijsr.net/getabstract.php?paperid=SUB152601, DOI: https://www.doi.org/10.21275/SUB152601



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top