International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 80 - Issue 13 |
Published: October 2013 |
Authors: Preeti Aggarwal, M. M. Chaturvedi |
![]() |
Preeti Aggarwal, M. M. Chaturvedi . Application of Data Mining Techniques for Information Security in a Cloud: A Survey. International Journal of Computer Applications. 80, 13 (October 2013), 11-17. DOI=10.5120/13920-1804
@article{ 10.5120/13920-1804, author = { Preeti Aggarwal,M. M. Chaturvedi }, title = { Application of Data Mining Techniques for Information Security in a Cloud: A Survey }, journal = { International Journal of Computer Applications }, year = { 2013 }, volume = { 80 }, number = { 13 }, pages = { 11-17 }, doi = { 10.5120/13920-1804 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2013 %A Preeti Aggarwal %A M. M. Chaturvedi %T Application of Data Mining Techniques for Information Security in a Cloud: A Survey%T %J International Journal of Computer Applications %V 80 %N 13 %P 11-17 %R 10.5120/13920-1804 %I Foundation of Computer Science (FCS), NY, USA
India is progressively moving ahead in the field of Information technology. The concept of e-commerce is already in place whereas e-governance is also on the same track. Similarly other sectors like health, judiciaries etc. are following the path. With the advent of information technology, malevolent people now have another option to cause damage to people by doing cyber attacks rather than physical damage, wherein the impact of cyber damage is equally devastating. As people are launching themselves into the e-world completely, the Cloud as a service is now shaping up the future. Since the cloud services are available through internet, it is the need of hour to prevent cyber attacks and at the same time trace the ill-willed persons for the sake of securing business, personal information and nation. Data Mining techniques and algorithms contribute tremendously to this task of assuring security of information on the cloud. In this paper, review of various data mining techniques and algorithms is presented which can help achieve security of information on cloud.