scholarly journals A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining

2020 ◽  
Vol 13 (1) ◽  
pp. 101
Author(s):  
Qian He ◽  
Hong He

Due to the increasing growth of technologies and the diversity of user needs in the field of information technology, the position of cloud computing is becoming more apparent. The development of computing infrastructure in any organization requires spending a lot of money, time, and manpower, which sometimes does not fit into the operational capacity of an organization. Therefore, organizations tend to use such technologies to advance their goals. A fully open and distributed structure in cloud computing and its services makes it an attractive target for attackers. This structure includes multiple service-oriented and distributed paradigms, multiple leases, multiple domains, and multi-user autonomous management structures that are more prone to security threats and vulnerabilities. In this paper, the basic concepts of the cloud computing and its applications have been investigated regarding to the importance of security issues. The proposed algorithm improves the level of security in the cloud computing platform through data mining and decision tree algorithm. Low computational burden and client numbers independency help to effectively implement the proposed algorithm in reality.

2014 ◽  
Vol 926-930 ◽  
pp. 2280-2283
Author(s):  
Qiong Ren

With the increasing of input data size, process cost will be very long, for the explosive growth of the Internet data even reached the point of single machine can handle. This article mainly introduces the architecture of the concept of cloud computing and, the mainstream of the analysis of the current data mining algorithms, based on cloud computing to develop the data mining system, providing the operation feasibility of data mining in cloud computing platform, having strong guiding significance.


Author(s):  
Arvind Dhaka ◽  
Amita Nandal ◽  
Rahul Dixit

This chapter deals with the main development challenges of 5G network. The 5G terminals can be made as reconfigurable multimode and cognitive radio enabled. Such networks will have software defined radio modulation schemes. The 5G mobile networks will focus on the development of the user terminals where the terminals will have access to different wireless technologies at the same time and will combine different flows from different technologies. It is beneficial to deploy cloud-computing platforms running on general-purpose hardware, leading to a cloud-RAN system. This chapter is focused on the challenges and benefits of implementing reconfigurable signal processing algorithms on a cloud-computing platform and address various security issues with cognitive radio networks.


2013 ◽  
Vol 760-762 ◽  
pp. 1718-1722
Author(s):  
Tao Zhang ◽  
Shou Ming Ma ◽  
Wei Min Lin ◽  
Yuan Yuan Ma

As a new paradigm for hosting and delivering services over the Internet, cloud computing technology especially suitable for dealing with series of problems in strong smart grid. However, despite the fact that cloud computing offers huge opportunities to the strong smart grid, the development of cloud computing technology is currently at its infancy, especially with many security issues to be addressed. In this paper, we present the overall architecture and benefits of cloud computing applications in strong smart grid. After that, we propose a unified security protection system framework of power cloud computing and give some practicable security protection suggestions.


2013 ◽  
Vol 380-384 ◽  
pp. 2063-2066
Author(s):  
Zhong Hua Deng ◽  
Bing Fan ◽  
Ying Jun Lu ◽  
Zhi Fang Li

As a Cloud computing platform, Hadoop has huge advantages in Data mining. The main aspects of Hadoop for data mining are discussed. A technical framework for big data mining based on Hadoop is analyzed.


2018 ◽  
Vol 7 (3.29) ◽  
pp. 263
Author(s):  
Sk. Wasim Akram ◽  
Dr P. Rajesh ◽  
SK. Shama

In the future, various information and things will be connected to the network. People can now live more convenient and comfortable life where the things and information coordinated together. A world where things are connected to network is referred as IOT (Internet of Things). A huge amount of incomplete data is generated by IOT need to process and responded to very short time. This pose challenge of dealing with big data from many geometrically distributed data sources which are to be managed and processed. To achieve this objective, cloud computing is a treated as one of the popular choice due to its scalability, storage, computational and other capabilities. However current cloud models are not intended to handle the essentials of IOT– volume, variety, and velocity of data. Moreover, as the physical distance between cloud and user increases, transmission latency increases with it, increasing response time and stressing of the user. In addition to that, the processing speed in this environment is largely dependent on the performance of user device. The viable solution to these problems is identified as Edge Computing. The Edge Computing platform works by allowing some application processing to be performed by a small edge server position between the cloud and user, and crucially in a location physically closed to the user. This paper comprehensively presents various research trends that are available in Edge, Fog computing along with a comparison is made among Cloud. Particularly the architecture, characteristics, key technologies, potential applications, security issues and challenges of Edge, Fog and Cloud Computing are discussed and summarized.  


Sign in / Sign up

Export Citation Format

Share Document