2016
DOI: 10.1155/2016/2385654
|View full text |Cite
|
Sign up to set email alerts
|

Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

Abstract: Presently, the popularity of cloud computing is gradually increasing day by day. The purpose of this research was to enhance the security of the cloud using techniques such as data mining with specific reference to the single cache system. From the findings of the research, it was observed that the security in the cloud could be enhanced with the single cache system. For future purposes, an Apriori algorithm can be applied to the single cache system. This can be applied by all cloud providers, vendors, data di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Different security and privacy protection techniques were reviewed in [16] from both hardware and software aspects, therefore enhancing the data security. Data mining techniques were applied in [17] using Apriori algorithm to ensure security in cloud. An efficient and provable secure anonymous two factor authentication was designed in [18] for not only ensuring security but was also proved to be computationally efficient.…”
Section: Related Workmentioning
confidence: 99%
“…Different security and privacy protection techniques were reviewed in [16] from both hardware and software aspects, therefore enhancing the data security. Data mining techniques were applied in [17] using Apriori algorithm to ensure security in cloud. An efficient and provable secure anonymous two factor authentication was designed in [18] for not only ensuring security but was also proved to be computationally efficient.…”
Section: Related Workmentioning
confidence: 99%
“…In the case of foundations of scientific programming, the work in [173] reviewing the main foundations of scientific programming techniques and the use of pattern matching techniques in large graphs [174] are examples of improvements and works in the scope of software techniques. Finally, applications in coal mining [175], recommendation engines for car sharing services [176], health risk prediction [177], text classification [178], or information security [179] are domains in which data are continuously being generated representing good candidates to apply scientific programming techniques.…”
Section: Data-intensive Engineering Environments and Scientificmentioning
confidence: 99%