We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Application of Data Mining Techniques for Information Security in a Cloud: A Survey

by Preeti Aggarwal, M. M. Chaturvedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 13
Year of Publication: 2013
Authors: Preeti Aggarwal, M. M. Chaturvedi
10.5120/13920-1804

Preeti Aggarwal, M. M. Chaturvedi . Application of Data Mining Techniques for Information Security in a Cloud: A Survey. International Journal of Computer Applications. 80, 13 ( October 2013), 11-17. DOI=10.5120/13920-1804

@article{ 10.5120/13920-1804,
author = { Preeti Aggarwal, M. M. Chaturvedi },
title = { Application of Data Mining Techniques for Information Security in a Cloud: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 13 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number13/13920-1804/ },
doi = { 10.5120/13920-1804 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:26.752055+05:30
%A Preeti Aggarwal
%A M. M. Chaturvedi
%T Application of Data Mining Techniques for Information Security in a Cloud: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 13
%P 11-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

India is progressively moving ahead in the field of Information technology. The concept of e-commerce is already in place whereas e-governance is also on the same track. Similarly other sectors like health, judiciaries etc. are following the path. With the advent of information technology, malevolent people now have another option to cause damage to people by doing cyber attacks rather than physical damage, wherein the impact of cyber damage is equally devastating. As people are launching themselves into the e-world completely, the Cloud as a service is now shaping up the future. Since the cloud services are available through internet, it is the need of hour to prevent cyber attacks and at the same time trace the ill-willed persons for the sake of securing business, personal information and nation. Data Mining techniques and algorithms contribute tremendously to this task of assuring security of information on the cloud. In this paper, review of various data mining techniques and algorithms is presented which can help achieve security of information on cloud.

References
  1. Dharminder Kumar and Deepak Bhardwaj, "Rise of Data Mining: Current and Future Application Areas", IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 1, September 2011.
  2. S. Mitra, S. K. Pal, and P. Mitra, "Data mining in soft Computing framework: A survey", IEEE Trans. Neural Networks, vol. 13, pp. 3 - 14, 2006.
  3. Han, J. and Kamber, M. , "Data mining: Concepts and Techniques", Morgan-Kaufman Series of Data Management Systems. San Diego: Academic Press, 2011.
  4. Amanpreet Chauhan, Gaurav Mishra, and Gulshan Kumar, "Survey on Data Mining Techniques in Intrusion Detection", International Journal of Scientific & Engineering Research Volume 2, Issue 7, July-2011.
  5. Jose F. Nieves, "Data Clustering for Anomaly Detection in Network Intrusion Detection", 2009.
  6. Dimitrios Zissis and Dimitrios Lekkas, "Addressing cloud computing security issues", Department of Product and Systems Design Engineering, University of the Aegean, Syros 84100, Greece, Future Generation Computer Systems 28 (2012) 583–592.
  7. Mohamed Hamdi, "Security of Cloud Computing, Storage, and Networking", School of Communication Engineering, Technopark El Ghazala, 2083 Tunisia, IEEE, 2012.
  8. Albert Greenberg, James Hamilton, David A. Maltz and Parveen Pate, "The Cost of a Cloud: Research Problems in Data Center Networks", Microsoft Research, Redmond, WA, USA.
  9. Tharam Dillon, "Cloud Computing: Issues and Challenges Digital Ecosystems and Business Intelligence", Institute Curtin University of Technology Perth, Australia, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
  10. Piatetsky-Shapiro and Gregory, "The Data-Mining Industry Coming of Age", in IEEE Intelligent Systems, vol. 14, issue 6, Nov 1999.
  11. Hsu J. , "Data Mining Trends and Developments: The Key Data Mining Technologies and Applications for the 21st Century", in the Proceedings of the 19th Annual Conference for Information Systems Educators.
  12. Korosh Golnabi, Richard K. Min, Latifur Khan, and Ehab Al-Shaer, "Analysis of Firewall Policy Rules Using Data Mining Techniques", IEEE, 2006.
  13. Abdul Nasir Khan, M. L. Mat Kiah, Samee U. Khan and Sajjad A. Madani, "Towards secure mobile cloud computing: A survey", Elsevier B. V, 2012.
  14. Md. Tanzim Khorshed, A. B. M. Shawkat Al, and Saleh A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing", Elsevier B. V, 2012.
  15. Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu, "Mobile cloud computing: A survey", Elsevier B. V, 2013.
  16. Saman Zonouz, Amir Houmansadra, Robin Berthiera, Nikita Borisov, and William Sanders, "Secloud: A cloud-based comprehensive and lightweight security solution for smartphones", Computers & Security, 2013.
  17. Pardeep Kumar, Nitin, Vivek Sehgal, Kinjal Shah, Shiv Shankar Prasad Shukla, and Durg Singh Chauhan. "A Novel Approach for Security in Cloud Computing using Hidden Markov Model and Clustering", 2011 World Congress on Information and Communication Technologies, IEEE, 2011.
  18. Qian Tao, Huiyou Chang, Yang Yi, and Chunqin Gu, "A Trustworthy Management Approach For Cloud Services QOS Data", Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, IEEE, 2010.
  19. Mohammad Farhatullah, "ALP: An Authentication and Leak Prediction Model for Cloud Computing Privacy", 3rd IEEE International Advance Computing Conference (IACC), 2013.
  20. P. Mell and T. Grance, "Draft nist working definition of cloud computing - v15", 21. Aug 2009.
  21. Arjun Kumar, HoonJae Lee, and Rajeev Pratap Singh, "Efficient and Secure Cloud Storage for Handling Big", Data, Information Science and Service Science and Data Mining (ISSDM), 2012.
  22. Zhidong Shen and Qiang Tong, "The Security of Cloud Computing System enabled by Trusted Computing Technology", 2010 2nd International Conference on Signal Processing Systems (ICSPS), IEEE, 2010
  23. P Jayashree, K. S. Easwarakumar, Anandharaman V, Aswin K, and Raja Vijay S, "A Proactive Statistical Defense Solution for DDOS Attacks in Active Networks", First International Conference on Emerging Trends in Engineering and Technology, IEEE, 2008.
  24. Saeed Samet and Ali Miri, "Privacy-Preserving Protocols for Perceptron Learning Algorithm in Neural Networks", 2008 4th International IEEE Conference "Intelligent Systems", IEEE, 2008.
  25. Jian Wang, Yongcheng Luo, Shuo Jiang, and Jiajin Le, "A Survey on Anonymity-based Privacy Preserving", IEEE, 2009.
  26. Aman Bakshi and Yogesh B, "Securing cloud from DDOS Attacks using Intrusion Detection System in Virtual Machine", 2010 Second International Conference on Communication Software and Networks, IEEE, 2010.
  27. Shiguo wang, "A Comprehensive Survey of Data Mining-based Accounting-Fraud Detection Research", 2010 International Conference on Intelligent Computation Technology and Automation, IEEE, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Data Mining Intrusion Detection Information Security