A Review on Cloud Data Mining and Data Integrity
Abstract
Keywords
Full Text:
PDFReferences
Dheresh Soni, Atish Mishra, (2011) Satyendra Singh Thakur, Applying Frequent Pattern Mining in Cloud Computing Environment, International Journal of Advanced Computer Research (ISSN: 2249-7277) Volume 1 Number 2 .
Ran Wolff , Assaf Schuster,(2004) Association Rule Mining in Peer-to-Peer Systems, IEEE transactions on systems, man, and cybernetics—part b cybernetics, vol. 34, no. 6.
Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, (2010) Security and Privacy in Cloud Computing: A Survey, Sixth International Conference on Semantics, Knowledge and Grids(IEEE).
Jayalatchumy, D., Ramkumar, P., Kadhirvelu, D., (2010) Preserving Privacy through Data Control in a Cloud Computing Architecture using Discretion Algorithm , Third International Conference on Emerging Trends in Engineering and Technology IEEE.
(2010) Trust and Reputation management, IEEE Internet Computing.
Zhidong Shen, Qiang Tong, (2010) The security of cloud computing system enabled by trusted computing technology, 2nd International conference on signal processing systems(ICSPS).
Sravan Kumar, R., Ashutosh Saxena, (2011) Data Integrity Proofs in Cloud Storage, IEEE.
Michael, L. Brodie, (2010) Data Integration at Scale: From Relational Data Integration to Information Ecosystems, 24th IEEE International Conference on Advanced Information Networking and Applications.
Zhang Jianhong, Chen Hua, (2010) Security storage in the cloud computing: A RSA-based assumption data integrity check without original data, International conference on educational and information technology.
Zue Jing, Zhang Jian-jun, (2010) A brief survey on the security model of cloud computing, Ninth international symposium on distributed computing and application to business, engineering and science.
Xin Yue Yang, Zhen Liu, Yan Fu, (2011) MapReduce as a Programming Model for Association Rules Algorithm on Hadoop.
Robert Grossman, Yunhong Gu, (2008) Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere, University of Illinois at Chicago and Open Data Group.
Kevin chiew, Shaowen qin, (2008) Analysis of privacy-preserving mechanisms for outsourcing data mining tasks, IEEE.
Ian molloy, Ninghuri li, and Tiancheng Li, (2009) On the (In) security and (Im) practically of outsourcing precise association data mining, ninth IEEE international conference on data mining.
Bostjan Brumen, TAtjana welzer, (2010), protecting medical data for analysis.
Mohammed J. Zaki, (2000) Scalable Algorithms for Association Mining, IEEE Transactions On Knowledge And Data Engineering, Vol. 12, No. 3, May/June 2000.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.