Implementation of data mining to enhance the performance of cloud computing environment

被引:2
作者
Rao A.S. [1 ]
Ramana A.V. [2 ]
Ramasubbareddy S. [1 ]
机构
[1] Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Telangana, Hyderabad
[2] Department of Electronics and Computer Engineering, Sreenidhi Institute of Science and Technology, Telangana, Hyderabad
关键词
C4.5; Cloud computing; Data mining; Decision tree; Multilayer percepton; Partial tree; Security;
D O I
10.1504/IJCC.2022.121074
中图分类号
学科分类号
摘要
To deal with large scale computing events, the advantages of cloud computing are used extensively, whereby the possibility of machines processing larger data is possible to deliver in a scalable manner. However, one cannot ignore the challenges involved using the technology linked with large amount of data and internet applications (i.e., cloud). One of the biggest challenges cloud computing faces is security breaching and related issues. In this paper, an extensive mitigation system is proposed to achieve enhanced security and safer environment while using the applications of cloud computing. Using the decision tree model Chaid algorithm, it is proved to be a robust technique to classify and decision making by providing high end security for the cloud services. In this paper, it is proved that the standards, controls and policies are very important to the management processes for securing and protecting the data involved at the time of processing. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:27 / 42
页数:15
相关论文
共 46 条
  • [1] Ali A.B.M.S., Smith K.A., On learning algorithm selection for classification, Journal on Applied Soft Computing, 6, 2, pp. 119-138, (2006)
  • [2] Ali A.B.M.S., Wasimi S.A., Data Mining: Methods and Techniques, (2007)
  • [3] Archer J., Boehm A., Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance 2009, (2009)
  • [4] Archer J., Et al., Top Threats to Cloud Computing, (2010)
  • [5] Bhel A., Emerging security challenges in cloud computing, 2011 World Congress on Information and Communication Technologies, pp. 217-222, (2011)
  • [6] Brodkin J., Gartner: Seven Cloud-computing Security Risks, (2008)
  • [7] Brunette G., Mogull R., Security Guidance for critical areas of focus in Cloud Computing V2. 1, 1, (2009)
  • [8] Catteddu D., Hogben G., Benefits, Risks and Recommendations for Information Security, (2009)
  • [9] Company H-P.D., HP ProLiant DL380 G4 Server-Specifications, (2012)
  • [10] Fox A., Griffith R., Joseph A., Katz R., Konwinski A., Lee G., Patterson D., Rabkin A., Stoica I., Above the Clouds: A Berkeley View of Cloud Computing, 13, (2009)