Research Issues on Web Mining
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.43-48, Mar-2018
Abstract
A collection of inter-related files on one or more web servers is known as Web, while web mining means extracting valuable information from web databases. Web mining is one of the data mining domains where data mining techniques are used for extracting information from the web servers. The web data includes web pages, web links, objects on the web and web logs. Web mining is used to understand the customer behavior, evaluate a particular website based on the information, which is stored in web log files. Web mining is generated by making use of the data mining techniques, classification, clustering, and association rules. The collection of information becomes very hard to find, extract, filter or evaluate the relevant information for the users. With the flood of information on the Web, Web mining is a new research issue, which draws great interest from many communities. Currently, there is no agreement about Web mining yet. It needs more discussion among researchers in order to define what it is exactly. In this paper, we have studied the basic concepts of web, web mining, classification, processes, the taxonomy and the function of Web mining.
Key-Words / Index Term
Web Mining, Taxonomy, web structure mining
References
[1] Mr. Dushyant B.Rathod, Dr.Samrat Khanna, “A Review on Emerging Trends of Web Mining and its Applications” ISSN: 2321-9939
[2] Usama Fayyad et al, “The KDD Process for Extracting Useful Knowledge from Volumes of Data”, Communications of the ACM, Vol. 39, No. 11, Nov. 1996, pp. 27-34.
[3] P. Maes. Agents that reduce work and information overload. Communications of the ACM, 37(7):30–40,1994.
[4] H. N. Vu, T. A. Tran, I. S. Na, and S. H. Kim,“Automatic Extraction of Text Regions from Document Images by Multilevel Thresholding and kmeans Clustering,” In Proceedings of IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS), pp. 329–334, 2015.
[5] R. Lokeshkumar1, R. Sindhuja2, Dr. P. Sengottuvelan, “A Survey on Pre-processing of Web Log Filein Web Usage Mining to Improve the Quality of Data” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 8, August 2014.
[6] AshirrK Kashyap, Iflah Naseem, Dheeraj Mandloi, "Web Mining an Approach to Evaluate the Web", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.79-85, 2017
[7] [Joy Shalom Sona, Prof. Asha Ambhaikar” A Reconciling Website System to Enhance Efficiency with Web Mining Techniques” International Journal Of Scientific & Engineering Research Volume 3, Issue 2, February-2012 1 ISSN 2229-5518.
[8] Sonia Sharma, Munishwar Rai, "Customer Behaviour Analysis using Web Usage Mining", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.47-50, 2017
[9] Ashish Kumar Garg, Mohammad Amir, Jarrar Ahmed, Man Singh, Sham Bansa,” Implementation of a Search Engine” International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.
[10] Jaideep Srivastava, “Web Mining: Accomplishments & Future Directions”, University of Minnesota USA, srivasta@cs.umn.edu,
[11] Md. Zahid Hasan, Khawja Jakaria Ahmad Chisty and Nur-E-Zaman Ayshik, “Research Challenge in Web Data Mining”, International Journal of Computer Science and Telecommunications Volume 3, Issue 7, July 2012
[12] D.Jayalatchumy, Dr. P.Thambidurai, “Web Mining Research Issues and Future Directions – A Survey”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 3.
[13] Ananthi.J,” A Survey Web Content Mining Methods and Applications for Information Extraction from Online Shopping Sites”, International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014.
[14] http://www.slideshare.net/Tommy96/web-mining-tutorial R. Lokeshkumar1, R. Sindhuja2, Dr. P. Sengottuvelan, “A Survey on Pre-processing of Web Log File in Web Usage Mining to Improve the Quality of Data” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 8, August 2014.
[15] Alberto Sillitti, Marco Scotto, Giancarlo Succi, Tullio Vernazza,” News Miner: a Tool for Information Retrieval”
[17] Mamta M. Hegde, Prof. M.V.Phatak, “Developing an approach for hyperlink analysis with noise reduction using Web Structure Mining”, International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May2012.
Citation
P.Joseph Charles, I.Carol, Barna Bass, "Research Issues on Web Mining", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.43-48, 2018.
Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic
Research Paper | Journal Paper
Vol.06 , Issue.02 , pp.49-53, Mar-2018
Abstract
To improve the performance of access control in cloud environment, different approaches has been discussed earlier. Towards the problem of access restriction, an efficient trust based access control mechanism is presented in this paper. The method maintains the access details of various services of different users in different time window. The time window access logs has various information about the service access and their status of completion. Using the log available, the method estimates the frequency of services being accessed. Also with the status of the services access, the method computes the trust factor. The frequency measures has been computed for different time window for each service. Based on the value of frequency measures, the method generates fuzzy rules. Based on the fuzzy rules generated, the trust factor has been estimated for any user. The method produces efficient results in access restriction and reduces the time complexity as well.
Key-Words / Index Term
Cloud Environment, Access Control, Fuzzy Rules, Frequency Analysis, Time Orient Approach
References
[1]. Wei Teng ; Geng Yang Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing, IEEE Transactions on Cloud Computing ( Volume: PP, Issue: 99 ), Page(s): 1 – 1, 2015.
[2]. Jun Luo, A Novel Role-based Access Control Model in Cloud Environments, Journal International Journal of Computational Intelligence Systems Volume 9, 2016 - Issue 1, 2016.
[3]. Lixia Xie and Chong Wang, Cloud Multidomain Access Control Model Based on Role and Trust-Degree, Hindawi, Journal of Electrical and Computer Engineering Volume 2016 (2016).
[4]. Kan Yang, Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach, IEEE Transactions on Multimedia, Vol 18, Issue: 5, May 2016.
[5]. Jongkil Kim, Surya Nepal, A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage, Data Science and Engineering , Volume 1, Issue 3, pp 149–160, 2016.
[6]. Mehdi Sookhaka,, F. Richard Yua, Attribute-based data access control in mobile cloud computing: Taxonomy and open issues, Elsevier, Future Generation Computer Systems 72 (2017) 273–287.
[7]. B.Srinivasa Rao, A Framework for Predicate Based Access Control Policies in Infrastructure as a Service Cloud, Int. Journal of Engineering Research and Applications, Vol. 6, Issue 2, (Part -6) February 2016, pp.36-44.
[8]. Nicolai Paladi, Providing User Security Guarantees in Public Infrastructure Clouds, IEEE Transaction on Cloud Computing, Vol. 5, Issue 3, 2017.
[9]. Jesus Luna, Quantitative Reasoning about Cloud Security Using Service Level Agreements, IEEE Transaction on Cloud Computing, Vol. 3, Issue 5, 2017.
[10]. Zheng Yan, Flexible Data Access Control Based on Trust and Reputation in Cloud Computing, IEEE Transaction on cloud computing, Vol.5 Issue 3, 2017.
[11]. Kei Fan, Privacy protection based access control scheme in cloud-based services, IEEE Transaction on China Communications, vol. 14, Issue 3, 2017.
[12]. Sakshi kathuria, "A Survey on Security Provided by Multi-Clouds in Cloud Computing", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.23-27, 2018.
[13]. Zhirong zen, Keyword Search With Access Control Over Encrypted Cloud Data, IEEE Transaction on sensor journal , vol 17, issue 3, 2017.
[14]. Jianghong Wei , Secure and Efficient Attribute-Based Access Control for Multi-authority Cloud Storage, IEEE System Journal vol. issue 99, 2017.
[15]. Jin Li, Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing, Cloud Computing Technology and Science (Cloud-Com), 2010.
[16]. J.Persis Jessintha and Dr.R.Anbuselvi,” Aggrandizing Authorization By Enhancing Trust Using Fuzzy Logic In Cloud Environment”, International Journal of Applied Engineering Research, 10, 538-542, 2015.
Citation
J. Persis Jessintha, R. Anbuselvi, "Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.49-53, 2018.
Survey on N-Queen Problem with Genetic Algorithm
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.54-58, Mar-2018
Abstract
The combinatorial optimization problem is a collection of problems which need a sample amount of time and effort to be solved. Vast difficulties have been occurring to solving these types of problem that there is no exact formula to solve the problem. Each feasible solution works on some order and the size of the probability increases algorithmically as the number of the problem also increases dynamically. This paper discusses about N–Queen problem, it is also a type of NP – hard problem. Many researchers have proposed various methods and algorithms for this problem. Henceforth, Genetic Algorithm is one kind of famous algorithm for solving NP hard problems. This paper mainly focuses on the review work of genetic algorithm to solve the N -Queen Problems (NPQ).
Key-Words / Index Term
N–Queen Problem, NP-hard problem, Genetic algorithm, Heuristic algorithm
References
[1] Kaveh, A.Ghazaan, M Ilchi. “A new meta-heuristic algorithm: Vibrating particles system, ScientiaIranica. Transaction A, Civil Engineering; Tehran ,Vol. 24, Iss. 2, (2017),pp 551-566.
[2] Cusack, C., Largent, J., Alfuth, R., &Klask, K. 2010. “Online Games as Social-Computational Systems for Solving NP-complete Problems”.In Proc. of Meaningful Play’10. 5.
[3] Er. Vishal Khanna, Er. Sarvesh Chopra, Review on N-Queen Optimization Using Tuned Hybrid Technique, International Journal of Engineering Sciences & Research Technology (Thomson Reuters),Vol.6, Issue.2,2017,pp.62-68.
[4] https://en.wikipedia.org/wiki/Search- based_software_engineering
[5] Ji-PyngChiou, Chung-Fu Chang and Chin-Ju Li,” A backtracking evolutionary algorithm for power systems”, MATEC Web of Conferences Volume,vol. 119, 2017.
[6] Doug Chatham,” The maximum queens problem with pawn”,
Recreational Mathematics Magazine,vol.3,Issue.6,2018,DOI: https://doi.org/10.1515/rmm-2016-0010.
[7] B Documentaries, “Full Solution of N-Queens Problem O Reilly”, http://oreillynQueensproblem.blogspot.in, 3-Sept-2016.
[8] Song Yan, Yang Guoxing, “A Genetic Algorithm for test paper”, International conference, 2013.
[9] ShokouhiM.Chubak P. RaeesyZ“Enhancing focused crawling with genetic algorithms”Vol: 4-6,2005, pp.503- 508.
[10] B.Klabbankoh, O.Pinngern. “applied genetic algorithms in information retrieval” Proceeding of IEEE ,pp.702- 711,Nov 2004.
[11] V.Thada, V.Jaglan, “Use of Genetic Algorithm in Web Information Retrieval”, International Journal of Emerging Technologies in Computational and Applied Sciences, vol.7,no.3,pp.278-281, Feb,2014.
[12] Anuneet Kumar Dubey, VijayanEllappan, Rakesh Paul, Vishal Chopra, “Comparative Analysis of Backtracking And Genetic Algorithm In N Queens’s Problem”, International Journal of Pharmacy &Technology, Vol.8, Issue.4,2016, pp.25618-25623.
[13] JalaleddinAghazadehheris Faculty of Mathematics and MohammadrezaAsgariOskoei, Modified Genetic Algorithm for Solving n-Queens Problem “,Iranian Conference on Intelligent Systems (ICIS), 2014.
[14] SaadAlharbi and Ibrahim Venkat, “A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem”, Journal of Optimization, 2017.
[15] Ahmed S. Farhan ,Wadhan Z. Tareq and Fouad H. Awad, “Solving N-Queens Problem using Genetic Algorithm ”, International Journal of Computer Applications, Vol.122, Issue.12, 2015,pp.11-14.
[16] Vishal Jain, DevendraSaini and K.N Dinesh Babu,” A Genetic Approach To Solve Problems From Diverse Domains”, International Journal of Advanced Scientific and Technical Research, vol.6, Issue -6,2016.
[17] Er. Vishal Khanna, Er. Sarvesh Chopra and Er.AbhishekBhardwaj,” N-Queens Problem Optimization Using Various Memetic Algorithms”, International Journal of Modern Computer Science, Vol.5, Issue.2, 2017.
[18] Soham Mukherjee, SantanuDatta, PramitBrataChanda and Pratik Pathak, “Comparative Study of Different Algorithms To Solve N-Queens Problem”, International Journal of Foundations of Computer Science and Technology, Vol.5, Issue.2, 2015,pp.15-27.
[19] VikasThada and Shivali Dhaka, “Performance Analysis of N-Queens Problem using Backtracking Algorithm Techniques ”, International Journal of Computer Applications, Vol.102, Issue.7,2014, pp. 26-29.
[20] Belal Al-Khateeb, Wadhah Z. Tareq, ” Solving 8-Queens Problem by Using Genetic Algorithms, Simulated Annealing and Randomization Method”, 2013 Sixth International Conference on Developments in systems engineering, 2013, pp.187.
[21] Er. Vishal Khanna, Er. Sarvesh Chopra and Er.AbhishekBhardwaj, “Comparative Analysis Of Backtracking, Tuned Hybrid technique And Genetic Algorithm For Optimization Of N-Queens Problem”, International Journal Of Engineering Sciences & Research Technology, Vol.6, Issue.3, 2017.
[22] S.Pothumani, “Solving N-Queens Problem using Various Algorithms-A Survey”, InternationalJournal of Advance Research in Computer Science and Software Engineering, Vol. 3, Issue. 2, 2013, pp. 247-250.
[23] Amarbir Singh and Sandeep Singh Dhillon, “A Comparative Study of Algorithms for N-Queens Problem”, International Journal of Advance Foundation and Research in Science and Engineering, Vol.1, Special Issue, 2015, pp.1-4.
[24] Ayad M. Turkyand, MohdSharifuddinAhmad , ” Using Genetic Algorithm for Solving N –Queens Problem”, International Symposium on Information Technology, vol.2, 2010.
[25] IvicaMartinjak and M. Golub, "comparison of heuristic algorithms for the n-Queen Problem,” Iinternational conference on information technology Interfaces, 2007.
[26] Marko Bozikovic, Marin Golub and Leo Budin, “Solving N-Queens Problem Using Global Parallel Genetic Algorithm”, European Conference Ljubljana Slovenia, 2003, pp.11-17.
[27] Milena Lazarova,” Efficiency Of Parallel Genetic Algorithm For Solving N-Queens ProblemOn Multicomputer Platform”, 9th WSEAS International Conference On Evolutionary Computing (EC’08), Sofia, Bulgaria, May 2-4, 2008.
Citation
S. Sathyapriya, R. Stephen, V.S.Joe Irudayaraj, "Survey on N-Queen Problem with Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.54-58, 2018.
Deduplicates In Big Data: A Technical Survey
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.59-65, Mar-2018
Abstract
Deduplication is a task of identifying one or more records in repository that represents same object or entity. The problem is that the same data may be represented in different way in every database. While merging the databases, duplicates occur despite different schemas, writing styles or misspellings. They are called as replicas. Removing replicas from the reposi¬tories provides high quality information and saves processing time. With the development of cloud computing through virtualization technology, creation of VMs rapidly increasing, this in turn increases data centres. Backup in virtualized environments takes the snapshot of VM called VM image and moved to backup device. Data is duplicated by VMs for many purposes like backup, fault tolerance, consistency, disaster recovery, high availability, etc., these results in unnecessary consumption of resources, such as network bandwidth and storage space. Data Deduplication is a process of detecting and removing duplicate data thus the amount of data, energy consumption and network bandwidth is reduced. This paper describes Deduplication methods for large scale databases (Big data) and several Deduplication techniques like Extreme Binning, MAD2, and Multi-level Deduplication where Deduplication is performed in backup services. The paper also describes Cloud spider, Liquid Deduplication techniques for VM images in Big Data extracted from cloud environment, their comparison based on several factors.
Key-Words / Index Term
Deduplication, Big data, Cloud, Live Virtual Machine Migration, Cloud spider, MAD2, Extreme Binning, Liquid, SAFE, Multi-Level Deduplication.
References
[1] T.Y.J.Naga Malleswari, D.Rajeswari, Dr.V. Jawahar Senthil Kumar, “A Survey of Cloud Computing, Architecture & Services Provided by Various Cloud Service Providers”, in proceedings of Interenational Conference on Demand Computing, 978-93-5087- 502-5 201, Bangalore, 2012.
[2] http://www.techopedia.com/definition/16821/virtual-machine-snapshot-vm-snapshot.
[3] K. Parimala1 G. Rajkumar, A. Ruba, S. Vijayalakshmi, "Challenges and Opportunities with Big Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.16-20, 2017
[4] EMC2, “Information Storage and Management”, in Wiley India Edition, 2nd ed.USA, 2012, pp.249-251.
[5] Qinlu He, Zhanhuai Li, Xiao Zhang, “Data Deduplication Techniques”, in International Conference on Future Information Technology and Management Engineering, China, 2010, pp.43-433.
[6] Priyanka Sethi, Prakash Kumar, “Leveraging Hadoop Framework to develop Duplication Detector and analysis using Map Reduce, Hive and Pig”, in IEEE 978-1-4799- 5173-4/14, 2014.
[7] Sumit Kumar Bose, Scott Brock, Ronald Skeoch, Nisaruddin Shaikh, Shrisha Rao, “Optimizing Live Migration of Virtual Machines Across Wide Area Networks Using Integrated Replication and Scheduling” in IEEE 978-1-4244-9493-4/11, 2011.
[8] Jiansheng Wei, HongJiang,Ke Zhou, Dan Feng, “MAD2: A Scalable High- Throughput Exact Deduplication Approach for Network Backup Service”, in IEEE, 978-1-4244- 7153-9/10, China, 2010.
[9] B.H.Bloom, “Space/Time trade-offs in hash coding with allowable errors”, Communications of the ACM, vol.13, no.7, p.422-426, July 1970.
[10] Z.Broder andM.Mitzenmacher, “Network Applications of Bloom Filters: A Survey”, Internet Mathematics, vol.1, pp.485-509,2005.
[11] Guohua Wang, Yuelong Zhao, Xiaoling Xie, Lin Liu, “Research on a clustering data de-duplication mechanism based on Bloom Filter, in IEEE, 978-1-4244 7874-3/10, 2010.
[12] Marcin Bienkowski, Miroslaw Korzeniowski , Friedhelm Meyer auf der Heide, “Dynamic Load Balancing in Distributed Hash Tables”, International Graduate School of dynamic intelligent systems, Germany, [Online]
[13] Yan Zhang, “on Protocol-Independent Data Redundancy Elimination” , IEEE Communicaitons Surveys &Tutorials, vol 16, No.1, First Quarter 2014.
[14] M.Al-laham, and I.M.M.E.Emary, “ Comparitive Study between various algorithms of data compression techniques”, International Journal Computer Science and Network Security, vol. 7, no.4, April 2007.
[15] M.O.Rabin, “Fingerprinting by random polynomials”, Center for Research in Computing Technology, Harvard University, Tech.Rep. TR-15-81, 1981.
[16] Deepavali Bhagwat, Kave Eshghi, Darrell D.E.Long, Mark Lillibridge, “Extreme Binning: Scalable, Parallel Deduplication for Chunk- Based File Backup” in IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems, 2009. MASCOTS `09.
[17] R.Rivest, “The MD5, message-digest algorithm”, IETF, Request For Comments (RFC) 1321, Apr. 1992, [Online]
[18] National Institute of Standards and Technology, “Secure hash Standard,”, FIPS 180-1, Apr. 1995. [Online]
http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf
[19] C.Policroniades and I.Pratt, “Alternatives for detecting redundancy in storage systems data”, in Proceedings of the General Track: 2004 USENIX Annual Technical Conference, 2004, pp. 73-86. Deduplication Techniques: A Technical Survey (IJIRST/ Volume 1 / Issue 7 / 062) All rights reserved by www.ijirst.org 325
[20] M.Dutch, “Understanding data Deduplication ratios”, SNIA Data Management Forum, June 2008.
[21] A.Z.Broder, “On the resemblance and containment of documents”, in SEQUENCES’97: Proceedings of the Compression and Complexity of Sequences 1997, pp. 21-29.
[22] K.Jin and E.L.Miller, “TheEffectiveness of Deduplication on Virtual Machine Disk Images”, in Proc. SYSTOR,Israeli Exp. Syst. Conf., New York, NY, USA, 2009, pp.1-12.
[23] A.Liguori and E.Hensbergen, “Experiences with Content Addressable Storage and Virtual Disks,” in Proc. WIOV08, SanDiego, CA, USA, 2008, p.5.
[24] XunZhao, Yang Zhang, Yongwei Wu, Kang Chen, Jinlei Jiang, Keqin Li, “ Liquid: A Scalable Deduplication File System for Virtual Machine Images”, IEEE Transactions on Parallel and Distributed Systems, vol.25, No.5, May 2014.
[25] A.V.Aho, P.J. Denning, and J.D. Ullman , “Principles of Optimal Page Replacement”, J.A.C.M, vol.18, no.1, pp. 80-93, Jan. 1971.
[26] Jaehong Min, Daeyoung Yoon, and Youjip Won, “Efficient Deduplication Techniques for Modern Backup Operation”, IEEE Transactions on Computers, vol.60. June 2011.
[27] A.Muthitachareon, B.Chen, D.Mazieres, “ A Low bandwidth Network File System”, SIGOPS Operating Systems Rev., vol.35, no.5, pp.174-187,2001.
[28] B.Zhu, K.Li, H.Patterson, “Avoiding the disk bottleneck in the data domain Deduplication file system” in FAST’08: Proceedings of the 6th USENIX Conference on File and Storage Technologies, pp. 1-14, Berkely, CA, USA, 2008.
[29] U.Manber. Finding similar files in a large file system, in proceedings of the USENIX Winter 1994 Technical Conference, pp. 1-10, 1994.
Citation
A.Sahaya Jenitha, V.Sinthu Janita Prakash, "Deduplicates In Big Data: A Technical Survey", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.59-65, 2018.
A Survey of Algorithms for Scheduling in the Cloud: In a metric Perspective
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.66-70, Mar-2018
Abstract
Cloud computing is a modern technology that provides all types of resources to the users with the help of internet. Resource management is the key factor that decides the performance of the cloud. Scheduling plays a prominent role in managing resources in the cloud. Scheduling also affects the power consumption of the data center. The cost of providing services increases when in appropriate scheduling is used. The environmental pollution increases by the emission of carbon. In this paper scheduling algorithms in the perspective of scheduling metrics such as throughput, response time, Resource utilization, fault tolerance and performance are presented.
Key-Words / Index Term
Resource scheduling, Cloud computing, Energy, Throughput, Response time
References
[1] P. Mell and T. Grance, The NIST Definition of Cloud Computing, National
Institute of Standards and Technology, InformationTechnology Laboratory Technical Report Version 15, 2009.
[2] Velagapudi Sreenivas, Prathap,M and Mohammed Kemal, “LoadBalancing Techniques: Major Challenge In Cloud Computing – A Systematic Review”, IEEE International Conference on Electronicsand Communication Systems (ICECS), 2014
[3] Anitya Kumar Gupta, Srishti Gupta, "Security Issues in Big Data with Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.27-32, 2017
[4] Botta, A., de Donato, W., Persico, V. and Pescape. A, “Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, Vol.56, pp.684-700, 2016
[5] Rajesh Verma , "Comparative Based Study of Scheduling Algorithms for Resource Management in Cloud Computing Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.4, pp.17-23, 2013
[6] L. Benedict Carvin, BJ. Hubert Shanthan, A.DalvinVinothKumar, Dr.L.Arockiam, “Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services”, International Journal of Computer Science, Vol.5,No.1,pp:1454-1462, 2017.
[7] BJ. Hubert Shanthan, A. DalvinVinothKumar,Er. KarthigaiPriyaGovindarajan ,Dr.L.Arockiam, “Scheduling for Internet of Things Applications on Cloud:AReview”,Imperial Journal of Inter disciplinaryResearch(IJIR), Vol.1, No.3, pp:1649-1653,2017.
[8] Anitha H M, P. Jayarekha , "Security Challenges of Virtualization in Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.37-43, 2018
[9] Qi, Z.T.L., Cheng, Z., Li, K., Khan, S.U., Li, K.: An energy-efficient task scheduling algorithm in DVFS-enabled cloud environment. J. Grid Comput. 14(1), 55–74 (2016) 3.
[10] Garima Malik and Gaganjot Kaur, "Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.114-116, 2016.
[11] Jiang, J., Lin, Y., Xie, G., Fu, L., Yang, J.: Time and Energy Optimization Algorithms for the Static Scheduling of Multiple Workflows in Heterogeneous Computing System. J. Grid Comput., 1–22 (2017). https://doi.org/10.1007/s10723-017-9391-5
[12] Ebrahimirad, V., Goudarzi, M., Rajabi, A.: Energy-aware scheduling for precedence-constrained parallel virtual machines in virtualized data centers. J. Grid Comput. 13(2), 233–253 (2015).
[13] Singh, S., Chana, I.: Metrics based workload analysis technique for IaaS cloud. In: The Proceeding of International Conference on Next Generation Computing and Communication Technologies 23 - 24 April 2014, Dubai, pp. 1–6 (2014).
[14] N. Deshai, P. Penchala Swamy, G.P. Saradhi Varma, "Enhanced Query Processing Technique Using RASP Effective Services in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.76-78, 2017
[15] Singh, S., Chana, I.: Cloud resource provisioning: survey, Status and Future Research Directions. Knowl. Inf. Syst. 49(3), 1005–1069 (2016).
[16] Singh, S., Chana, I.: Q-aware: quality of service based cloud resource provisioning. Comput. Electr. Eng. 47, 138–160 (2015).
[17] Singh, S., Chana, I.: QoS-aware autonomic cloud computing for ICT. In: The proceeding of International Conference on Information and Communication Technology for Sustainable Development (ICT4SD - 2015), Ahmedabad, India, 3 - 4 July 2015, pp. 569–577. Springer, Singapore (2016)
[18] Prodan, R., Wieczorek, M., Fard, H.M” Double auction based scheduling of scientific applications on distributed grid and cloud environments”J. Grid Comput.9(4), 531–548 (2011)
[19] V.K. Saxena, S. Pushkar, "Privacy Preserving using Encryption Proxy in Data Security", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017
[20] Nasrinakhter and Mohamed Othman ”Energy aware resource allocation of cloud data center: review and open issues” DOI 10.1007/s10586-016-0579-4, 2016.
[21] Xu Zhe-jun “Research on Cloud Computing Resource Scheduling Based on PSO-MC Algorithm”International Journal of Grid Distribution Computing Vol. 8, No.4, (2015), pp. 153-162, 2015
[22] Mihaela-Andreea Vasile, Florin Pop,Radu-Ioan Tutueanu,Valentin Cristea “ HySARC2: Hybrid Scheduling Algorithm Based on Resource Clustering in Cloud Environments” International Conference on Algorithms and Architectures for Parallel Processing ICA3PP: Algorithms and Architectures for Parallel Processing, pp 416-425(2013)
[23] SukhpalSinghandInderveerChana ”EARTH: Energy-aware autonomic resource scheduling in cloud computing”Journal of Intelligent & Fuzzy Systems 30 1581–1600(2016)
[24] Priyanka Mod , Prof. Mayank Bhatt “ACO Based Dynamic Resource Scheduling for Improving Cloud Performance” International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 11, November( 2014)
[25] YoungJu Moon,HeonChang Yu,Joon-Min Gil and JongBeom Lim”A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments”Human-centric Computing and Information SciencesDOIhttps://doi.org/10.1186/s13673-017-0109-2 (2017)
[26] Ali Al-maamari and Fatma A. Omara“ Task Scheduling Using PSO Algorithm in Cloud Computing Environments” International Journal of Grid Distribution Computing Vol. 8, No.5, pp.245-256 (2015)
[27] MalaKalra,SarbjeetSingh“A review of metaheuristic scheduling techniques in cloud computing” Egyptian Informatics Journalhttps://doi.org/10.1016/j.eij.2015.07.001 (2015)
[28] Chung-Ming Cheung,Cheong Leung “DFFR: A Distributed Load Balancer for Data CenterNetworks” IEEEInternational Conference on Communication Systems (ICCS)DOI: 10.1109/ICCS.2016.7833574 (2017)
[29] G. Raghu, Neeraj K. Sharma, Shridhar G. Domanal and G. Ram Mohana Reddy “Memory-Based Load Balancing Algorithm in Structured Peer-to-Peer System” Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, pp.431-439(2018)
[30] Ramandeep Kaur and Navtej Singh Ghumman. “A Load Balancing Algorithm Based on Processing Capacities of VMs in CloudComputing” Big Data Analytics (2018)
[31] Ramandeep Kaur and Navtej Singh Ghumman “Task-Based Load Balancing Algorithm by Efficient Utilization of VMs in Cloud Computing”Big Data Analytics pp 55-61 (2018)
[32] Amanpreet Chawla and Navtej Singh Ghumman.: Package-Based Approach for Load Balancing in Cloud Computing “ Big Data Analytics pp 71-77 (2018)
[33] Aditya Narayan Singh and Shiva Prakash “WAMLB: Weighted Active Monitoring Load Balancing in Cloud Computing”Big Data Analytics pp 677-685 (2018)
[34] Hong Zhong, Yaming Fang, Jie Cui “LBBSRT: An efficient SDN load balancing scheme based on server response time” http://dx.doi.org/10.1016/ (2017)
[35] D. Chitra Devi and V. RhymendUthariaraj “Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Non-preemptive Dependent Tasks”The Scientific World Journal
Volume 2016 (2016), Article ID 3896065, 14
[36] Bibhav Raj, Pratyush Ranjan, Naela Rizvi, Prashant Pranav ,andSanchita Paul “Improvised Bat Algorithm for LoadBalancing-Based Task Scheduling”Progress in Intelligent Computing Techniques: Theory, Practice, and Applications pp 521-530 (2018)
[37] Narander Kumar and Diksha Shukla”Load Balancing Mechanism Using Fuzzy Row Penalty Method in Cloud ComputingEnvironment”Information and Communication Technology for Sustainable Development pp 365-373(2018)
Citation
V.A. Jane, B.J. Hubert Shanthan, L. Arockiam, "A Survey of Algorithms for Scheduling in the Cloud: In a metric Perspective", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.66-70, 2018.
A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
Research Paper | Journal Paper
Vol.06 , Issue.02 , pp.71-75, Mar-2018
Abstract
Mobile Ad hoc Networks (MANET) are self configuring, transportation less, dynamic wireless networks in which the nodes are resource constrained. Intrusion Detection Systems (IDS) are used in MANETs to monitor actions so as to detect any intrusion in the otherwise vulnerable network. In this paper, we present efficient schemes for analyzing and optimizing the time length for which the intrusion detection systems require to remain active in a mobile ad hoc network. A probabilistic model is proposed that makes use of help between IDSs among neighbourhood nodes to reduce their unit active time. Usually, an IDS has to run all the time on every join to oversee the network behaviour.
Key-Words / Index Term
References
[1] S. Zeadally, R. Hunt, Y-S. Chen, A. Irwin and A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4, pp. 217-241, 2012.
[2] S. K. Bhoi and P. M. Khilar, ”Vehicular communication: a survey”, IET Networks, vol. 3, no. 3, pp. 204 - 217, 2014.
[3] S. Marti, T. J. Giuli, K. La and M. Baker, ”Mitigating Routing Misbehavior in a Mobile Ad-hoc Environment,” Proc. 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255- 265, August 2000.
[4] C. Manikopoulos and L. Ling, ”Architecture of the Mobile Ad-hoc Network Security (MANS) System,” Proc. IEEE International Conference on Systems, Man and Cybernetics, vol. 4, pp. 3122- 3127, October 2003.
[5] K. Nadkarni and A. Mishra, ”Intrusion Detection in MANETs - The Second Wall of Defense,” Proc. IEEE Industrial Electronics Society Conference ’2003, pp. 1235-1239, Roanoke, Virginia, USA, Nov. 2-6, 2003.
[6] A. Partwardan, J. Parker, A. Joshi, M. Iorga and T. Karygiannis, ”Secure Routing and Intrusion Detection in Ad-hoc Networks,” Proc. 3rd IEEE International Conference on Pervasive Computing and Communications, Hawaii Island, Hawaii, March 8-12, 2005.
[7] N. Marchang and R. Datta, ”Lightweight Trust-based Routing Protocol for Mobile Ad Hoc Networks,” IET Information Security, vol. 6, no. 4, pp. 77-83, 2012.
[8] M. Hadded, R. Zagrouba, A. Laouiti, P. Muhlethaler, and L. A. Saidane, “A multi-objective genetic algorithm-based adaptive weighted clustering protocol in vanet,” in Evolutionary Computation (CEC), 2015 IEEE Congress on, 2015, pp. 994–1002.
[9] Y. Peng, Z. Abichar, and J. M. Chang, “Roadside-aided routing (RAR) in vehicular networks,” in IEEE International Conference on Communications, 2006, pp. 3602–3607.
[10] N. Wisitpongphan, O. K. Tonguz, J. S. Parikh, P. Mudalige, F. Bai, and V. Sadekar, “Broadcast storm mitigation techniques in vehicular ad hoc networks,” IEEE Wireless Communications, vol. 14, no. 6, pp. 84–94, 2007.
[11] I. Tal and G.-M. Muntean, “User-oriented cluster-based solution for multimedia content delivery over vanets,” in IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2012, pp. 1–5.
[12] Y. Shi, L. H. Zou, and S. Z. Chen, “A mobility pattern aware clustering mechanism for mobile vehicular networks,” in Applied Mechanics and Materials, vol. 130, 2012, pp. 317–320.
[13] C. S. Jensen, D. Lin, and B. C. Ooi, “Continuous Clustering of Moving Objects,” IEEE Transactions on Knowledge & Data Engineering, vol. 19, no. 9, pp. 1161–1174, 2007.
[14] J. Bernsen and D. Manivannan, “Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification,” Pervasive and Mobile Computing, vol. 5, no. 1, pp. 1–18, 2009.
[15] K. Jagadeesh, S. S. Sathya, G. B. Laxmi, and B. B. Ramesh, “A survey on routing protocols and its issues in vanet,” International Journal of Computer Applications, vol. 28, no. 4, pp. 38–44, 2011.
[16] S. Singh and S. Agrawal, “Vanet routing protocols: Issues and challenges,” in Engineering and Computational Sciences (RAECS), 2014 Recent Advances in, 2014, pp. 1–5.
Citation
S. Sathiyavani , "A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.71-75, 2018.
Bandwidth Allocation based Load Balancing for RPL (BA-LBRPL)
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.76-80, Mar-2018
Abstract
The RPL routing protocol published in RFC 6550 was designed for efficient and reliable data collection in low power and lossy networks. It constructs a Destination Oriented Direction Acyclic Graph (DODAG) for data forwarding. However, due to the load imbalance the parent nodes face heavier workload, bottle neck and hot spot problems. Such load imbalance will result in the parent nodes quickly exhausting their energy, and shorten the overall network lifetime. There are attempts to load balance the RPL network using LB-OF algorithm and Child Node Count (CNC) object. Load balance using LB-OF and CNC provides load balance of the DODAG but fails in terms of load balancing network resources, i.e., bandwidth. In this paper, we propose Bandwidth Allocation based load balancing algorithm in RPL named (BA-LBRPL). BA-LBRPL removes the deficiency faced in LB-OF and CNC and enhances resource load balancing in low power and lossy environments. Thus, BA-LBRPL is efficient theoretically in thwarting bottleneck, fast energy depletion of parents and improve life of the network
Key-Words / Index Term
Internet of Things, RPL, Load Balancing, Bandwidth Allocation
References
[1] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. McCann, and K. Leung, “A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities”, IEEE Wirel. Commun., vol. 20, no. 6, pp. 91–98, 2013.
[2] S. Sivagurunathan et al (2016), “Connectivity Framework for smart Devices”(ed) by Zaigham Mahmood, Computer and Communications Network, Springer, 307-331, 2016
[3] T. Winter, P. Thubert, A. R. Corporation, and R. Kelsey, “RPL: Routing Protocol for Low Power and Lossy Networks,” pp. 1–157.
[4] H.-S. Kim, H. Kim, J. Paek, and S. Bahk, “Load Balancing under Heavy Traffic in RPL Routing Protocol for Low Power and Lossy Networks,” IEEE Trans. Mob. Comput., vol. 1233, no. c, pp. 1–1, 2016.
[5] Marwa Mamdough et al, “RPL Load balancing via minimum degree spanning tree”, IEEE transaction, 2016
[6] X. Liu, J. Guo, G. Bhatti, P. Orlik, and K. Parsons, “Load Balanced Routing for Low Power and Lossy Networks.”
[7] O. Iova, F. Theoleyre, and T. Noel, “Exploiting multiple parents in RPL to improve both the network lifetime and its stability,” IEEE Int. Conf. Commun., vol. 2015–Septe, pp. 610–616, 2015.
[8] Quan Le, Thu Ngo-Quynh, Thomas Magedanz et al, “RPL based multipath Routing protocols doe Internet of Things”, IEEE Xplore, 2014
[9] Minkeun Ha, Kiwoong Kwon, Daeyoung Kim, Peng-Yong Kong, “Dynamic and Distributed Load Balancing Scheme in Multi-gateway based 6LoWPAN”, IEEE International Conference on Green Computing, 2015
[10] B. G. Mamoun Qasem, Ahmed Al-Dubai, Imed Romdhani, “Load Balancing Objective Function in RPL,” . Internet Draft, February, pp. 1–10, 2017.
[11] O Gnawali, P Levis, “The Minimum Rank with Hysteresis Objective Functione”, RFC, pp. 1–13, 2012.
[12] J Hou, R Jadhav, Z Luo, “Optimization of Parent node delection in RPL based Networks”, Internet Draft, pp.1-11, 2017
Citation
A. Sebastian, S. Sivagurunathan, "Bandwidth Allocation based Load Balancing for RPL (BA-LBRPL)", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.76-80, 2018.
Comparative Analysis of Facial Recognition involving Feature Extraction Techniques
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.81-86, Mar-2018
Abstract
Facial Recognition is a primary branch of Pattern Recognition used to distinguish faces based on feature variation. All the objects in the universe has a proper arrangement termed as “pattern”, thus every human face has a unique pattern. Those patterns are identified or verified by Recognition process. Especially Facial Recognition done manually is a trouble-free process whereas recognizing a face using computers is a knotty task because of illumination, occlusions, facial expression and pose. The input for the recognition face can be in any digital sources such as image or video from the face database. Therefore the key features of the face such as brows, eyes, nose and mouth serves as input. In order to achieve utmost accuracy in facial recognition in digital images different feature extraction techniques are used in Facial Recognition. Feature based and Appearance based complexities like feature extraction and illumination for automated computer vision recognition is discussed. This paper evaluates feature extraction techniques in a broad perspective.
Key-Words / Index Term
Facial Recognition, Feature Extraction, Illumination, Appearance Based, Recognition Rate
References
[1] Xiaoxing Li et al., “Adapting geometric attributes for expression-invariant 3D face recognition”, IEEE International Conference on Shape Modeling and Applications (SMI), 2007, pp 21- 32.
[2] Md. Sarfaraz Jalil, Joy Bhattacharya, “A Survey on Various Facial Expression Techniques”, International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015, pp 1212-1214.
[3] Jian Yang, David Zhang et al., “Two -Dimensional PCA: A New Approach to Appearance-Based Face Representation and Recognition”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 26, No. 1, January 2004, pp 131-137.
[4] Baback Moghaddam et al., USA, “Bayesian face recognition”, The Journal of Pattern recognition society, Pattern Recognition 33 (2000), pp 1771-1782.
[5] Priyanka Sharma et al., Chandigarh, “Classification in Pattern Recognition: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013.
[6] Zhong Jin,et al., “Face recognition based on the uncorrelated Discriminant transformation” , The Journal of Pattern recognition society, Pattern Recognition 34 (2001), pp 1405-1416.
[7] Aruni Roy Chowdhury et al., “One-to-many face recognition with bilinear CNNs” in Computer Vision and Pattern Recognition, 28 Mar 2016.
[8] Roman et al., Poland, “Rough set methods in feature selection and recognition”, Pattern recognition letters, Pattern Recognition Letters 24 (2003), pp 833–849.
[9] Zhanwei Chenet al., “Towards a face recognition method based on uncorrelated discriminant sparse preserving projection”, Springer, Science + Business Media New York 2015.
[10] Rahimeh Rouhi et al., “A Review On Feature Extraction Techniques In Face Recognition”, Signal & Image Processing: An International Journal (SIPIJ) Vol.3, No.6, December 2012.
[11] Thomas et al., England, “Face Recognition: A Comparison of Appearance-Based Approaches” Proc. VIIth Digital Image Computing: Techniques and Applications, Dec 2003, Sydney.
[12] Jorg orts in Face Recognition Techniques, The University of Wisconsin madison in ECE533 – Image Processing Project.
[13] Timo Ahonen et al., “Face Description with Local Binary Patterns: Application to Face Recognition”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 28, No. 12, December 2006, pp 2037 - 2041.
[14] Li-Fen Chen et al., “A new LDA-based face recognition system which can solve the small sample size problem”, Pattern Recognition 33 (2000), pp 1713-1726.
[15] Rajkiran et al., “An improved face recognition technique based on Modular PCA approach”, Pattern Recognition Letter 25 (2004), pp 429-436.
[16] King-Sun Fu et al., “Pattern Recognition and Image Processing”, IEEE Transactions On Computers, Vol. C-25, No. 12, December 1976, pp 1136 - 1346.
[17] M. Parisa Beham et al., “Face Recognition Using Appearance Based Approach: A Literature Survey” Proceedings published in International Journal of Computer Applications (IJCA), pp 16 - 21.
[18] M A Rabbani et al., “A Different Approach to Appearance –based Statistical Method for Face Recognition Using Median”, International Journal of Computer Science and Network Security, VOL.7 No.4, April 2007, pp 262 – 267.
[19] Aisha Azeem et al., Pakistan, “A Survey: Face Recognition Techniques under Partial Occlusion” in International Arab Journal of Information Technology, January 2014.
[20] Divyarajsinh et al., “Face Recognition Methods & Applications”, International Journal of Computer Technology & Applications, Vol 4 (1), pp 84-86.
Citation
M. Merlin Steffi, J. John Raybin Jose, "Comparative Analysis of Facial Recognition involving Feature Extraction Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.81-86, 2018.
Data Access Control Techniques and Security Challenges in Cloud Computing: A Survey
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.87-95, Mar-2018
Abstract
Cloud computing is a distinctively different environment, that has captured many hearts and it has emerged as a powerful computing environment with the provision of high standard data storage mechanism and sharing the data efficiently among multiple users across the globe. As it is dynamic in nature, it offers innumerable advantages such as flexibility, resource pooling, elasticity, and scalability, etc. One of the important features of cloud computing is the multitenant environment, which enables outsourcing data into the server; however many security challenges incorporated with this are unauthorized access, data privacy, malicious attacks, and threats. Accessing the data from the server plays a very important role in cloud computing environment. This paper analysis several data access control schemes have been described to ensure the data access as convenient and efficient as possible. Access control is a security technique that defines the access policy, and it can be used to legalize who or what can use various resources in a computing environment. It is necessary to have tightly controlled system to access the data securely and the data access risk must be addressed. This survey explores myriad ways of Cloud Data Access Control Techniques and its challenges.
Key-Words / Index Term
Cloud Computing; Access Control System; Security Technique; Authentication
References
[1] Mell Peter, and Tim Grance, "The NIST Definition of Cloud Computing.”, pp. 20-23, 2011.
[2] Arockiam, L. and Monikandan, S. and Parthasarathy G. “Cloud Computing: A Survey”, International Journal of Internet Computing, Volume 1, No. 2, pp.26-33, 2011.
[3] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, San Francisco, CA., pp. 29-42, 2003.
[4] H. Lin, Z. Yan and R. Kantola, "CDController: A Cloud Data Access Control System Based on Reputation," IEEE International Conference on Computer and Information Technology (CIT), Helsinki, pp. 223-230,2017.
[5] Chase M., “Multi-authority Attribute Based Encryption”, In: Vadhan S.P. (eds) Theory of Cryptography. TCC 2007. Lecture Notes in Computer Science, vol 4392. Springer, Berlin, Heidelberg, 2007.
[6] J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," 2007 IEEE Symposium on Security and Privacy (SP `07), Berkeley, CA, pp. 321-334, 2007.
[7] X. Liu, Y. Xia, S. Jiang, F. Xia and Y. Wang, "Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing", IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, pp. 477-484, 2013.
[8] J. Li et al., "Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing", IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, IN, pp. 89-96, 2010.
[9] Amit Sahai and Brent Waters. Fuzzy Identity-Based Encryption. EUROCRYPT’ 05, LNCS 3494, Springer, pp. 457-473, 2005.
[10] S. Ruj, A. Nayak and I. Stojmenovic, "DACC: Distributed Access Control in Clouds”, IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, , pp. 91-98, 2011.
[11] Z. Yan, X. Li, M. Wang and A. V. Vasilakos, "Flexible Data Access Control Based on Trust and Reputation in Cloud Computing”, IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 485-498, 2017.
[12] L. Zhou, V. Varadharajan and M. Hitchens, "Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, 2013, pp. 1947-1960, 2013.
[13] I. El Ghoubach, F. Mrabti and R. Ben Abbou, "Efficient secure and privacy preserving data access control scheme for multi-authority personal health record systems in cloud computing," 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, 2016, pp. 174-179, 2016.
[14] Mustapha Ben Saidi, Anas Abou Elkalam, Abderrahim Marzouk, “TOrBAC: A Trust Organization Based Access Control Model for Cloud Computing Systems”, International Journal of Soft Computing and Engineering (IJSCE) Volume-2, Issue-4, ISSN: 2231-2307, pp.122-130, 2012.
[15] Dongwan Shin, Ying Wang, and William Claycomb. "A Policy-based Decentralized Authorization Management Framework for Cloud Computing", ACM Symposium on Applied Computing (SAC 12), Riva del Garda (Trento), Italy, 26-30, 2012.
[16] S. Fugkeaw and H. Sato, "CLOUD-CAT: A collaborative access control tool for data outsourced in cloud computing", Tenth International Conference on Digital Information Management (ICDIM), Jeju, pp. 243-248, 2015.
[17] M. S. Ferdous, A. Margheri, F. Paci, M. Yang and V. Sassone, "Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations,” IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, pp. 2632-2633, 2017.
[18] J. Hu, L. Chen, Y. Wang and S. H. Chen, "Data Security Access Control Model of Cloud Computing", International Conference on Computer Sciences and Applications, Wuhan, pp. 29-34, 2013.
[19] W. Tian, H. Xu, M. Komi and J. Zhang, "Secure and flexible data sharing via ciphertext retrieval for cloud computing", IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), Macau, pp. 161-166, 2017.
[20] F. Khan, H. Li and L. Zhang, "Owner Specified Excessive Access Control for Attribute Based Encryption," in IEEE Access, vol. 4, pp. 8967-8976, 2016.
[21] R. Aluvalu and L. Muddana, "A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing”, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, pp. 1-5, 2016.
[22] S. Kattimani and S. Pachouly, "A robust and verifiable threshold multi-authority access control system in public cloud storage", 2016 International Conference on Computing Communication Control and automation (ICCUBEA), Pune, pp. 1-4, 2016.
[23] S. Yu, C. Wang, K. Ren and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," IEEE INFOCOM, San Diego, CA, pp. 1-9, 2010.
[24] R. Ahuja and S. K. Mohanty, "A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage," IEEE Transactions on Cloud Computing, vol 14. no. 8, pp. 1-14, 2015.
[25] S. Rizvi and J. Mitchell, "A Semi-distributed Access Control Management Scheme for Securing Cloud Environment", IEEE 8th International Conference on Cloud Computing, New York City, NY, pp. 501-507, 2015.
[26] P. P. Gutal, R. S. Kothe and S. B. Jahveri, "Efficient hierarchical cloud storage data access structure with KDC”, IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), Pune, pp. 328-332, 2016.
[27] Wang, Guojun, Qin Liu, and Jie Wu. “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services”, 17th ACM conference on Computer and Communications Security,Chicago, Illinois, USA, pp.735-737, 2010.
[28] Z. Shen, J. Shu and W. Xue, "Keyword search with access control over encrypted data in cloud computing," IEEE 22nd International Symposium of Quality of Service (IWQoS), Hong Kong, pp. 87-92, 2014.
[29] M. Auxilia and K. Raja, "A semantic-based access control for ensuring data security in cloud computing”, International Conference on Radar, Communication and Computing (ICRCC), Tiruvannamalai, pp. 171-175, 2012.
[30] Cloud Security Alliance, “Security Guidance for critical areas of focus in Cloud Computing V.30,” CSA, Tech, Rep.,2003.
[31] Arockiam.L. and Monikandan.S, “Data Security and privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Volume 2.No. 8, pp.3064-3070, 2013.
Citation
S.S. Manikandasaran, S. Sudha, "Data Access Control Techniques and Security Challenges in Cloud Computing: A Survey", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.87-95, 2018.
A Literature Review on Text Mining Techniques and Methods
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.96-99, Mar-2018
Abstract
Text mining has become an important research area. It deals with machine supported analysis of text. The unstructured texts which contains massive amount of information cannot simply be used for further processing by the computer and knowledge from unstructured text completed by using text mining. It uses the techniques from information retrieval, information extraction as well as natural language processing and connects them with the algorithms and methods of KDD, data mining, machine learning and statistics. In this paper we have discussed briefly about the text mining process and the techniques used in the text mining.
Key-Words / Index Term
Text Mining, Data Mining, Text Preprocessing, Text Transformation, Clustering
References
[1] Priyanka patil T. and S.I. Nipanikar, “Survey on scene text detection and text recognition”, (IJARCCE) International Journal of Advanced Research in Computer and Communication Engineering. ISSN (e):2278-1021, Vol.5, Issue 3, March 2016.
[2] Priyanka Muchhadiya and Rajkot .C, “Detection and localization of texts from natural scene images: a hybrid approach” (RHIMRJ), Research HUB: International Multidisciplinary Research Journal . ISSN 2349-7637(e) Volume 02, Number 7 (July 2015), pp. 1-7.
[3] Kumuda T. and Basavaraj L, “Hybrid approach to extract text in natural scene images” – International Journal of Computer Applications (IJOCA).ISSN 0975-8887 vol.142, No.10 (May 2016), PP.18-22.
[4] Miss. Poonam B. Kadam, Mrs.Latika R. and Desai, “A hybrid approach to detect and recognize texts in images”,(IOSRJEN) , IOSR Journal of Engineering . ISSN 2250-3021 Volume 04, Number 7 (July 2014), pp. 19-20.
[5] Navathe, shamkant B and Elmasri Ramez, (2000), "Data mining and text mining in fundamental database system", Pearson education pvt.inc, Singapore, 841-872.
[6] Q.Guo and W.D.S.Yu, "A novel approach to the text mining ", 2010.
[7] J.Uma Mahesh and S.Lalitha, "Data mining feature clustering algorithms in text classification" in International conference on computer science and information technology, ISBN: 978-93-81693-5, 2012
[8] Haralampos Karanikas and Manchester (2005), "Knowledge discovery in text and text mining software", center for research in information management.
[9] V.Gupta, G.S Lehal, " A survey of text mining technique and applications" in journal of emerging technologies in web intelligence, 2009.
[10] Liritano S and Ruffolo M (2011), "Managing the knowledge contained in electronic documents: a clustering method for text mining", IEEE 455-458.
[11] Setu madhavi and Krishna R (2008), "Experiments on supervised learning algorithms for text categorization", international conference, IEEE computer society 1-8.
[12] Yi Feng Pan, Xinwen Hot, and Cheng, “A hybrid approach to detect and localize text in natural scene images”, (IEEE), Volume 20, Number 3 (March 2011), pp. 800-813.
Citation
S Murugan, R. Karthika, "A Literature Review on Text Mining Techniques and Methods", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.96-99, 2018.