Views: 124 , Downloads: 114 | CTR: 92 % | Weekly Popularity: ⮙2
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
A Secure Information Hiding Approach in Cloud Using LSB
Mudasir Ahmed Muttoo, Pooja Ahlawat
The continuous development of cloud computing is giving way to more cloud services, due to which security of cloud services, especially data privacy protection, becomes more critical. This research work explores the basic features of data mining techniques in cloud computing and securing the data. The status of the development of cloud computing security, the data privacy analysis, security auditing, data monitoring and other challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The implementation of data mining techniques through cloud computing encourages the users to extract meaningful hidden predictive information from virtually integrated data warehouse that reduces the costs of storage and infrastructure.
Keywords: Cloud Computing, data security, Knowledge Discovery
Edition: Volume 4 Issue 7, July 2015
Pages: 1771 - 1776
How to Cite this Article?
Mudasir Ahmed Muttoo, Pooja Ahlawat, "A Secure Information Hiding Approach in Cloud Using LSB", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156857, Volume 4 Issue 7, July 2015, 1771 - 1776
124 PDF Views | 114 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Views: 201 , Downloads: 173 | CTR: 86 %
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Similar Articles with Keyword 'data security'
Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Views: 134 , Downloads: 98 | CTR: 73 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1949 - 1953A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service
Pooja Saini, Kanchan Narula
Views: 141 , Downloads: 102 | CTR: 72 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2535 - 2538A Survey on Security Mechanism using Colors and Armstrong Numbers
Nutan Gurav, Pratap Singh
Views: 125 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙5
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2467 - 2469Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud
Shazadi Fatima Rizvi, A. N. Jaiswal
Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1398 - 1401A Review on Encryption Techniques to Secure a Cloud
Ramandeep Kaur, Ashish Verma
Similar Articles with Keyword 'Knowledge Discovery'
Views: 147 , Downloads: 101 | CTR: 69 %
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2681 - 2688A Proposed Framework Using Neural Network in Web Mining for Improving the Performance of E-Learning System
Dar Masroof Amin, Atul Garg
Views: 132 , Downloads: 102 | CTR: 77 % | Weekly Popularity: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2734 - 2838Efficient Techniques for Mining High Utility Itemsets from Transactional Databases: A Survey
Ganesh Sawant, Bhawana Kanawde
Views: 151 , Downloads: 103 | CTR: 68 % | Weekly Popularity: ⮙3
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1102 - 1105Subgroup Discovery a Data Mining Technique: Immense Survey
Deepali Nidhan Gunjate, B. R. Kanawade
Views: 133 , Downloads: 103 | CTR: 77 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1267 - 1275A Survey on Feature Selection Techniques and Classification Algorithms for Efficient Text Classification
Pradnya Kumbhar, Manisha Mali
Views: 143 , Downloads: 104 | CTR: 73 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 572 - 576A Research Article on Data Mining in Addition to Process Mining: Similarities and Dissimilarities
S. Sowjanya Chintalapati, Ch.G.V.N.Prasad, J. Sowjanya, R.Vineela