CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

A Novel Hybrid Approach for Secure Cloud Mining using Lossless Image Format

by Sanjima Manocha, Sheveta Vashisht
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 7
Year of Publication: 2014
Authors: Sanjima Manocha, Sheveta Vashisht
10.5120/17194-7389

Sanjima Manocha, Sheveta Vashisht . A Novel Hybrid Approach for Secure Cloud Mining using Lossless Image Format. International Journal of Computer Applications. 98, 7 ( July 2014), 7-11. DOI=10.5120/17194-7389

@article{ 10.5120/17194-7389,
author = { Sanjima Manocha, Sheveta Vashisht },
title = { A Novel Hybrid Approach for Secure Cloud Mining using Lossless Image Format },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 7 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number7/17194-7389/ },
doi = { 10.5120/17194-7389 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:25:34.461294+05:30
%A Sanjima Manocha
%A Sheveta Vashisht
%T A Novel Hybrid Approach for Secure Cloud Mining using Lossless Image Format
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 7
%P 7-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research work explores the basic features of data mining techniques in cloud computing and securing the data using edge detection method. This research work tries to integrate data mining techniques into cloud computing and image processing making it a hybrid approach. The implementation of data mining techniques through cloud computing encourages the users to extract meaningful hidden predictive information from virtually integrated data warehouse that reduces the costs of storage and infrastructure. Centralize management of software and data storage, with assurance of efficient, reliable and secure services for their users through Edge detection based approach for image steganography.

References
  1. Ruxandra-?tefania PETRE (2012), "Data mining in Cloud Computing" Database Systems Journal vol. III, no. 3/2012
  2. Sneha Arora and Sanyam Anand, "A New Approach for Image Steganography using Edge detection method", International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 1, Issue 3, May 2013
  3. Peter Mell, Timothy Grance "The NIST Definition of Cloud Computing", NIST Special Publication 800-145
  4. Ahlam Shakeel Ahmed Ansari, Kailas Kisan Devadkar (2012), "Secure Cloud Mining", IEEE International Conference on Computational Intelligence and Computing Research 2012
  5. University Vitez, Travnik, Bosnia and Herzegovina, "Data Mining and Cloud Computing", Journal of Information Technology and Applications JITA 2(2012) 2:75-87
  6. Michael J. A. Berry,Gordon S. Linoff (2009) "Data Mining Techniques", Pearson Publications,page(s)347-359,386-393,401-434
  7. Jain Nitin, Meshram Sachin and Dubey Shikha (2012) "Image Steganography Using LSB and Edge – Detection Technique", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July.
  8. Agrawal, R. , Imielinski, T. and Swami, A. N. , Mining Association Rules between Sets of Items in Large Databases. In Proceedings of SIGMOD, 20716, 1993.
  9. Jayshree Jha and Leena Ragha, Educational Data Mining using Improved Apriori Algorithm International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013).
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Cloud Computing Image Steganography Canny Edge Detection.