Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2016, Article ID 2385654, 5 pages
http://dx.doi.org/10.1155/2016/2385654
Research Article

Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

King Abdulaziz City for Science and Technology, P.O. Box 6086, Riyadh 11442, Saudi Arabia

Received 31 January 2016; Revised 5 June 2016; Accepted 15 June 2016

Academic Editor: José L. Vázquez-Poletti

Copyright © 2016 Amany AlShawi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Hao and D. Han, “The study and design on secure-cloud storage system,” in Proceedings of the International Conference on Electrical and Control Engineering (ICECE '11), pp. 5126–5129, Yichang, China, September 2011. View at Publisher · View at Google Scholar
  2. S. Gupta, S. R. Satapathy, P. Mehta, and A. Tripathy, “A secure and searchable data storage in cloud computing,” in Proceedings of the 3rd IEEE International Advance Computing Conference (IACC '13), pp. 106–109, IEEE, Ghaziabad, India, February 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. H. Dev, T. Sen, M. Basak, and M. Eunus Ali, “An approach to protect the privacy of cloud data from data mining based attacks,” in Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (SCC '12), pp. 1106–1115, 2012.
  4. J. Wang, J. Wan, Z. Liu, and P. Wang, “Data mining of mass storage based on cloud computing,” in Proceedings of the 9th International Conference on Grid and Cloud Computing (GCC '10), pp. 426–431, Shanghai, China, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. L. Van Wel and L. Royakkers, “Ethical issues in web data mining,” Ethics and Information Technology, vol. 6, no. 2, pp. 129–140, 2004. View at Publisher · View at Google Scholar · View at Scopus
  6. Q. Yang and X. Wu, “10 Challenging problems in data mining research,” International Journal of Information Technology and Decision Making, vol. 5, no. 4, pp. 597–604, 2006. View at Publisher · View at Google Scholar · View at Scopus
  7. L. Torgo, Data Mining with R: Learning with Case Studies, Chapman & Hall/CRC, New York, NY, USA, 2010.
  8. S. Sharma, A. Chugh, and A. Kumar, “Enhancing data security in cloud storage,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 5, pp. 2132–2134, 2013. View at Google Scholar
  9. P. Aggarwal and M. M. Chaturvedi, “Application of data mining techniques for information security in a cloud: a survey,” International Journal of Computer Applications, vol. 80, no. 13, pp. 11–17, 2013. View at Publisher · View at Google Scholar
  10. A. S. Patil, “A review on data mining based cloud computing,” International Journal of Research in Science and Engineering, vol. 1, no. 1, pp. 1–14, 2014. View at Google Scholar
  11. S. Singh and R. Sapra, “Secure replication management in cloud storage,” International Journal of Emerging Trends and Technology in Computer Science, vol. 3, no. 2, pp. 251–254, 2014. View at Google Scholar
  12. G. Thippa Reddy, K. Sudheer, K. Rajesh, and K. Lakshmanna, “Employing data mining on highly secured private clouds for implementing a security-asa- service framework,” Journal of Theoretical and Applied Information Technology, vol. 59, no. 2, pp. 317–326, 2014. View at Google Scholar · View at Scopus
  13. S. Sharma and H. Mehta, “Improving Cloud Security Using Data Mining,” IOSR Journal of Computer Engineering, vol. 16, no. 1, pp. 66–69, 2014. View at Publisher · View at Google Scholar
  14. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Kumar, H. Lee, and R. P. Singh, “Efficient and secure cloud storage for handling big data,” in Proceedings of the 6th International Conference on New Trends in Information Science and Service Science and Data Mining (ISSDM '12), pp. 162–166, Taipei, Taiwan, October 2012. View at Scopus
  16. M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing,” Future Generation Computer Systems, vol. 28, no. 6, pp. 833–851, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. R. Bhadauria, R. Borgohain, A. Biswas, and S. Sanyal, “Secure authentication of cloud data mining API,” Acta Technica Corviniensis-Bulletin of Engineering, vol. 3, no. 1, 2014. View at Google Scholar
  18. K. Sasireka and K. Raja, “An approach to improve cloud data privacy by preventing from data mining based attacks,” International Journal of Scientific and Research Publications, vol. 4, no. 2, pp. 1–4, 2014. View at Google Scholar
  19. J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers, San Francisco, Calif, USA, 2006.
  20. J. Han, “Data mining techniques,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD ’96), p. 545, Montreal, Canada, June 1996. View at Publisher · View at Google Scholar