Loading…
Secure cloud mining
Cloud computing is a solution for cheap and efficient storage; it is also used for analyzing mass data. Its aim is to power up the next generation data centers. Many companies are opting for cloud storage; hence it is important to use an efficient and effective data mining strategy to mine the cloud...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 4 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Ansari, Ahlam Shakeel Ahmed Devadkar, Kailas Kisan |
description | Cloud computing is a solution for cheap and efficient storage; it is also used for analyzing mass data. Its aim is to power up the next generation data centers. Many companies are opting for cloud storage; hence it is important to use an efficient and effective data mining strategy to mine the cloud storage to extract interesting patterns and relationship between variables in large databases. These data patterns are nothing but forecasting or predictions that can be used by the companies in near future to increase their sales. But the predictions that are generated as a result of mining should be secure from interception. Hence we propose a Secure Cloud Mining (SCM) architecture that will generate a Secure Forecasting Report (SFR) for the company. |
doi_str_mv | 10.1109/ICCIC.2012.6510249 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6510249</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6510249</ieee_id><sourcerecordid>6510249</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-d40ac3be8cd31203c1ec245a3995fd679273d2ee7af4df65e9f7f4152c8188773</originalsourceid><addsrcrecordid>eNo1j71KA0EURkckoCZb2ZkmL7Cbe-fObymDJgsBC9OHceaOjCQx7JrCt1cwVh-nOAc-IR4QOkTwyz6EPnQSUHZGI0jlr0TjrUNlLCEpctfi7h-kuhHNOH4AwK9s0Jlbcf_K6TzwIu0_z3lxqMd6fJ-JSYn7kZvLTsX2-Wkb1u3mZdWHx01bPXy1WUFM9MYuZUIJlJCTVDqS97pkY720lCWzjUXlYjT7YotCLZND56ylqZj_ZSsz705DPcThe3e5QT-n1zld</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure cloud mining</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ansari, Ahlam Shakeel Ahmed ; Devadkar, Kailas Kisan</creator><creatorcontrib>Ansari, Ahlam Shakeel Ahmed ; Devadkar, Kailas Kisan</creatorcontrib><description>Cloud computing is a solution for cheap and efficient storage; it is also used for analyzing mass data. Its aim is to power up the next generation data centers. Many companies are opting for cloud storage; hence it is important to use an efficient and effective data mining strategy to mine the cloud storage to extract interesting patterns and relationship between variables in large databases. These data patterns are nothing but forecasting or predictions that can be used by the companies in near future to increase their sales. But the predictions that are generated as a result of mining should be secure from interception. Hence we propose a Secure Cloud Mining (SCM) architecture that will generate a Secure Forecasting Report (SFR) for the company.</description><identifier>ISBN: 1467313424</identifier><identifier>ISBN: 9781467313421</identifier><identifier>EISBN: 9781467313438</identifier><identifier>EISBN: 1467313440</identifier><identifier>EISBN: 9781467313445</identifier><identifier>EISBN: 1467313432</identifier><identifier>DOI: 10.1109/ICCIC.2012.6510249</identifier><language>eng</language><publisher>IEEE</publisher><subject>Browsers ; Cloud computing ; Cloud Mining ; Cloud Storage ; Companies ; Data mining ; Distributed Data Mining ; Encryption ; Security ; Servers ; Task analysis</subject><ispartof>2012 IEEE International Conference on Computational Intelligence and Computing Research, 2012, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6510249$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6510249$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ansari, Ahlam Shakeel Ahmed</creatorcontrib><creatorcontrib>Devadkar, Kailas Kisan</creatorcontrib><title>Secure cloud mining</title><title>2012 IEEE International Conference on Computational Intelligence and Computing Research</title><addtitle>ICCIC</addtitle><description>Cloud computing is a solution for cheap and efficient storage; it is also used for analyzing mass data. Its aim is to power up the next generation data centers. Many companies are opting for cloud storage; hence it is important to use an efficient and effective data mining strategy to mine the cloud storage to extract interesting patterns and relationship between variables in large databases. These data patterns are nothing but forecasting or predictions that can be used by the companies in near future to increase their sales. But the predictions that are generated as a result of mining should be secure from interception. Hence we propose a Secure Cloud Mining (SCM) architecture that will generate a Secure Forecasting Report (SFR) for the company.</description><subject>Browsers</subject><subject>Cloud computing</subject><subject>Cloud Mining</subject><subject>Cloud Storage</subject><subject>Companies</subject><subject>Data mining</subject><subject>Distributed Data Mining</subject><subject>Encryption</subject><subject>Security</subject><subject>Servers</subject><subject>Task analysis</subject><isbn>1467313424</isbn><isbn>9781467313421</isbn><isbn>9781467313438</isbn><isbn>1467313440</isbn><isbn>9781467313445</isbn><isbn>1467313432</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j71KA0EURkckoCZb2ZkmL7Cbe-fObymDJgsBC9OHceaOjCQx7JrCt1cwVh-nOAc-IR4QOkTwyz6EPnQSUHZGI0jlr0TjrUNlLCEpctfi7h-kuhHNOH4AwK9s0Jlbcf_K6TzwIu0_z3lxqMd6fJ-JSYn7kZvLTsX2-Wkb1u3mZdWHx01bPXy1WUFM9MYuZUIJlJCTVDqS97pkY720lCWzjUXlYjT7YotCLZND56ylqZj_ZSsz705DPcThe3e5QT-n1zld</recordid><startdate>201212</startdate><enddate>201212</enddate><creator>Ansari, Ahlam Shakeel Ahmed</creator><creator>Devadkar, Kailas Kisan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201212</creationdate><title>Secure cloud mining</title><author>Ansari, Ahlam Shakeel Ahmed ; Devadkar, Kailas Kisan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-d40ac3be8cd31203c1ec245a3995fd679273d2ee7af4df65e9f7f4152c8188773</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Browsers</topic><topic>Cloud computing</topic><topic>Cloud Mining</topic><topic>Cloud Storage</topic><topic>Companies</topic><topic>Data mining</topic><topic>Distributed Data Mining</topic><topic>Encryption</topic><topic>Security</topic><topic>Servers</topic><topic>Task analysis</topic><toplevel>online_resources</toplevel><creatorcontrib>Ansari, Ahlam Shakeel Ahmed</creatorcontrib><creatorcontrib>Devadkar, Kailas Kisan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ansari, Ahlam Shakeel Ahmed</au><au>Devadkar, Kailas Kisan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure cloud mining</atitle><btitle>2012 IEEE International Conference on Computational Intelligence and Computing Research</btitle><stitle>ICCIC</stitle><date>2012-12</date><risdate>2012</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><isbn>1467313424</isbn><isbn>9781467313421</isbn><eisbn>9781467313438</eisbn><eisbn>1467313440</eisbn><eisbn>9781467313445</eisbn><eisbn>1467313432</eisbn><abstract>Cloud computing is a solution for cheap and efficient storage; it is also used for analyzing mass data. Its aim is to power up the next generation data centers. Many companies are opting for cloud storage; hence it is important to use an efficient and effective data mining strategy to mine the cloud storage to extract interesting patterns and relationship between variables in large databases. These data patterns are nothing but forecasting or predictions that can be used by the companies in near future to increase their sales. But the predictions that are generated as a result of mining should be secure from interception. Hence we propose a Secure Cloud Mining (SCM) architecture that will generate a Secure Forecasting Report (SFR) for the company.</abstract><pub>IEEE</pub><doi>10.1109/ICCIC.2012.6510249</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1467313424 |
ispartof | 2012 IEEE International Conference on Computational Intelligence and Computing Research, 2012, p.1-4 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6510249 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Browsers Cloud computing Cloud Mining Cloud Storage Companies Data mining Distributed Data Mining Encryption Security Servers Task analysis |
title | Secure cloud mining |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T17%3A26%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20cloud%20mining&rft.btitle=2012%20IEEE%20International%20Conference%20on%20Computational%20Intelligence%20and%20Computing%20Research&rft.au=Ansari,%20Ahlam%20Shakeel%20Ahmed&rft.date=2012-12&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.isbn=1467313424&rft.isbn_list=9781467313421&rft_id=info:doi/10.1109/ICCIC.2012.6510249&rft.eisbn=9781467313438&rft.eisbn_list=1467313440&rft.eisbn_list=9781467313445&rft.eisbn_list=1467313432&rft_dat=%3Cieee_6IE%3E6510249%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-d40ac3be8cd31203c1ec245a3995fd679273d2ee7af4df65e9f7f4152c8188773%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6510249&rfr_iscdi=true |