Open Access   Article Go Back

Study on Differential Query Services Using Data Mining Techniques in Cloud Computing

S.Kamalavardhini 1 , S.Baladeepika 2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-11 , Page no. 119-123, Nov-2015

Online published on Nov 30, 2015

Copyright © S.Kamalavardhini, S.Baladeepika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Kamalavardhini, S.Baladeepika , “Study on Differential Query Services Using Data Mining Techniques in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.119-123, 2015.

MLA Style Citation: S.Kamalavardhini, S.Baladeepika "Study on Differential Query Services Using Data Mining Techniques in Cloud Computing." International Journal of Computer Sciences and Engineering 3.11 (2015): 119-123.

APA Style Citation: S.Kamalavardhini, S.Baladeepika , (2015). Study on Differential Query Services Using Data Mining Techniques in Cloud Computing. International Journal of Computer Sciences and Engineering, 3(11), 119-123.

BibTex Style Citation:
@article{_2015,
author = { S.Kamalavardhini, S.Baladeepika },
title = {Study on Differential Query Services Using Data Mining Techniques in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2015},
volume = {3},
Issue = {11},
month = {11},
year = {2015},
issn = {2347-2693},
pages = {119-123},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=748},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=748
TI - Study on Differential Query Services Using Data Mining Techniques in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - S.Kamalavardhini, S.Baladeepika
PY - 2015
DA - 2015/11/30
PB - IJCSE, Indore, INDIA
SP - 119-123
IS - 11
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2407 2197 downloads 2277 downloads
  
  
           

Abstract

Cloud processing as a developing innovation trend is estimated to reshape the advances in Information technology. In a cost-efficient cloud infrastructure, a client can tolerate a certain degree of interval while retrieving Information from the cloud to diminish costs. In this paper, we address two major issues in such an environment: secrecy and efficiency. We first review a hidden keyword based document recovery plan that was formerly proposed by Ostrovsky. Their structure licenses a client to get records of interest from a not trusted server without disclosing any info. The primary disadvantage is that it will cause a huge questioning above acquired on the cloud, and thus goes opposite the novel intention of cost efficiency. In this paper, we present a scheme, termed viable Information retrieval for positioned query, and based on a conglomeration and appropriation layer, to diminish questioning above acquired on the cloud. In viable Information retrieval for positioned query, inquiries are classified into numerous ranks, where a higher positioned query can get a higher proportion of coordinated files. A client can get records on demand by selecting inquiries of dissimilar ranks. Huge number of coordinated records is useful in this feature, but the client just wants a little subset of them. Under dissimilar parameter settings, broad estimations have been conducted together analytical models and on a genuine cloud infrastructure, in request to examine the usefulness of our schemes.

Key-Words / Index Term

Cloud Computing, Single Cloud, Multi-Cloud, Cloud Storage

References

[1] Shaikh, F.B. ; Dept. of Comput. & Technol., SZABIST, Islamabad, Pakistan ; Haider, S., “Security threats in cloud computing”, Published in: Internet Technology and Secured Transactions (ICITST), 2011 International Conference for Date of Conference: 11-14 Dec. 2011 Page(s): 214 – 219.
[2] Almorsy, M. ; Comput. Sci. & Software Eng., Swinburne Univ. of Technol., Hawthorn, VIC, Australia ; Grundy, John ; Ibrahim, A.S., “Collaboration-Based Cloud Computing Security Management Framework”, Published in: Cloud Computing (CLOUD), 2011 IEEE International Conference on Date of Conference: 4-9 July 2011 Page(s): 364 – 371.
[3] Zehua Zhang ; Sch. of Inf. Sci. & Eng., Yunnan Univ., Kunming, China ; Xuejie Zhang, “Realization of open cloud computing federation based on mobile agent”, Published in: Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on (Volume:3 ) Date of Conference: 20-22 Nov. 2009 Page(s): 642 – 646.
[4] Wang En Dong ; State Key Lab. of High-end Server & Storage Technol., Beijing, China ; Wu Nan ; Li Xu, “QoS-Oriented Monitoring Model of Cloud Computing Resources Availability”, Published in: Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on Date of Conference: 21-23 June 2013 Page(s): 1537 – 1540.
[5] Amanatullah, Y. ; Hochschule Fulda, Angewandte Inf., Fulda, Germany ; Lim, C. ; Ipung, H.P. ; Juliandri, A., “Toward cloud computing reference architecture: Cloud service management perspective”, Published in: ICT for Smart Society (ICISS), 2013 International Conference on Date of Conference: 13-14 June 2013 Page(s): 1 – 4.
[6] Revar, A.G. ; Bhavsar, M.D.” Securing user authentication using single sign-on in Cloud Computing”, Published in: Engineering (NUiCONE), 2011 Nirma University International Conference on Date of Conference: 8-10 Dec. 2011 Page(s): 1 – 4.
[7] Boyang Li ; Dept. of Electr. & Comput. Eng., Clarkson Univ., Potsdam, NY, USA ; Chen Liu,” Parallel BP Neural Network on Single-chip Cloud Computer”, Published in: High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on Date of Conference: 24-26 Aug. 2015 Page(s): 1871 – 1875.
[8] AlZain, M.A. ; Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia ; Pardede, E. ; Soh, B. ; Thom, J.A.” Cloud Computing Security: From Single to Multi-clouds”, Published in: System Science (HICSS), 2012 45th Hawaii International Conference on Date of Conference: 4-7 Jan. 2012 Page(s): 5490 – 5499.
[9] Magedanz, T. ; Tech. Univ., Berlin, Germany ; Schreiner, F.” QoS-aware multi-cloud brokering for NGN services: Tangible benefits of elastic resource allocation mechanisms”, Published in: Communications and Electronics (ICCE), 2014 IEEE Fifth International Conference on Date of Conference: July 30 2014-Aug. 1 2014 Page(s):168 – 173.
[10] Lee, Dah-Sheng ; Network Operations Laboratory, Chunghwa Telecom Laboratories, Taipei city, Taiwan, R.O.C. ; Wei-Te Sung ; Shuang-Mei Wang ; Jin-Yuan Shun,” Multi-cloud service fulfillment architecture for enabling digital rain forest”, Published in: Network Operations and Management Symposium (APNOMS), 2013 15th Asia-Pacific Date of Conference: 25-27 Sept. 2013 Page(s):1 – 3.
[11] Suganthi, J. ; Dept. of Comput. Sci. & Eng, Hindusthan Coll. of Eng. & Technol., Coimbatore, India ; Ananthi, J. ; Archana, S.” Privacy preservation and public auditing for cloud data using ASS in Multi-cloud”, Published in: Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on Date of Conference: 19-20 March 2015 Page(s):1 – 6.
[12] Slamanig, D. ; Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol. (TUG), Graz, Austria ; Hanser, C.” On cloud storage and the cloud of clouds approach”, Published in: Internet Technology And Secured Transactions, 2012 International Conference for Date of Conference: 10-12 Dec. 2012 Page(s): 649 – 655.
[13] Ning Li ; Nat. Eng. Res. Center for Supporting Software of Enterprise Internet Services, Kingdee Software (China) Co. Ltd., Shenzhen, China ; Liang-Jie Zhang ; Ping Xu ; Li Wang,” Research on Pricing Model of Cloud Storage”, Published in: Services (SERVICES), 2013 IEEE Ninth World Congress on Date of Conference: June 28 2013-July 3 2013 Page(s): 412 – 419.
[14] Yen-Hung Kuo ; Cloud Syst. Software Inst., Inst. for Inf. Ind., Taipei, Taiwan ; Yu-Lin Jeng ; Juei-Nan Chen” A Hybrid Cloud Storage Architecture for Service Operational High Availability”, Published in: Computer Software and Applications Conference Workshops (COMPSACW), 2013 IEEE 37th Annual Date of Conference: 22-26 July 2013 Page(s): 487 – 492.
[15] Prabavathy, B. ; Dept. of Comput. Sci., SSN Coll. of Eng., Kalavakkam, India ; Priya, K. ; Babu, C.” A load balancing algorithm for private cloud storage”, Published in: Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on Date of Conference: 4-6 July 2013 Page(s): 1 – 6.