SlideShare una empresa de Scribd logo
1 de 28
SECURE CLOUD MINING
    Internal Guide        Presented By
Prof. K.K. Devadkar   Ahlam Shakeel A. Ansari
Outline

•   Abstract
•   Introduction
•   Cloud Storage
•   Data Mining
•   Proposed Architecture
•   Conclusion


Prepared By- Ahlam Shakeel Ahmed Ansari         2
ABSTRACT
Prepared By- Ahlam Shakeel Ahmed Ansari   3
Cloud computing provides cheap and
      efficient solutions of storing and analyzing
      mass data and it aims to power up the next
      generation data centers. Many companies
      are opting for cloud storage and shifting
      their data ware house over cloud; hence it is
      important to use an efficient and effective
      data mining strategy to mine the cloud
      storage to extract interesting patterns and
      relationship between variables in large
      databases.

Prepared By- Ahlam Shakeel Ahmed Ansari
                                              4
These data patterns are nothing but
   forecasting or predictions that can be used
   by the companies in near future to increase
   their sales, develop its new marketing
   strategy. But if the cloud used is public cloud
   then the predictions that are generated as a
   result of mining should be secure from
   attacks such as interception. Hence we
   propose a Secure Cloud Mining (SCM)
   architecture that will generate a Secure
   Forecasting Report (SFR) for the companies
   that will use cloud mining.
Prepared By- Ahlam Shakeel Ahmed Ansari      5
INTRODUCTION
Prepared By- Ahlam Shakeel Ahmed Ansari   6
Publish

                                                  Inform                                           scale

                                                   Interact
                                                                                   web



                                                    Integrate

                                                      Transact




Prepared By- Ahlam Shakeel Ahmed Ansari
                                                 Discover (intelligence)
                                                                           Semantic
                                                                           discovery




                                                   Automate (discovery)
                                                                                       HPC, cloud
                                                                                       Data-intensive




                                                 Social media and networking


                                                 Data marketplace and analytics
                                          time


        7
                                                                                           deep web
                                                                                                           Evolution of Internet Computing
Evolution of Computing
          Mainframe

                        Personal
                       Computer
                            Client - Server
                                          Web Services

                                                   Cloud
                                                 Computing

Prepared By- Ahlam Shakeel Ahmed Ansari                      8
• Cloud distributes the computing tasks to the
  resource pool constituted of a large number
  of computers, so that a variety of application
  systems can obtain computing power,
  storage space and a variety of software
  services on demand.



Prepared By- Ahlam Shakeel Ahmed Ansari    9
• A public cloud is one based on the standard cloud computing
  model, in which a service provider makes resources, such as
  applications and storage, available to the general public over
  the Internet. Public cloud services may be free or offered on
  a pay-per-usage model.

• The main benefits of using a public cloud service are:
     – Easy and inexpensive set-up because hardware, application and
       bandwidth costs are covered by the provider.
     – Scalability to meet needs.
     – No wasted resources because you pay for what you use.




Prepared By- Ahlam Shakeel Ahmed Ansari                         10
• We use the distributed association rule mining algorithm for
  generating the prediction reports.

• In this seminar an architecture is proposed that can be used
  by the companies for prediction analytics so they can device
  some marketing strategies accordingly by mining their data
  over the cloud and that provides them with a secure
  forecasting report.




Prepared By- Ahlam Shakeel Ahmed Ansari               11
CLOUD
                   STORAGE
Prepared By- Ahlam Shakeel Ahmed Ansari   12
MOBILE

              PC

                                                               REMOTE DESKTOP


                                       Cloud
                                      Storage
  DATABASE


                                                               REMOTE SERVER




                    NOTEBOOK                       TABLET PC

                           FIG: Overview of Cloud Storage
Prepared By- Ahlam Shakeel Ahmed Ansari                              13
DATA MINING
Prepared By- Ahlam Shakeel Ahmed Ansari   14
Calculate                Calculate
                                          Confidence & broad       Confidence & broad
                                          cast it to other nodes   cast it to other nodes


                                          Accept the global         Accept the global
                                          confidence and            confidence and
                                          generate item set         generate item set




           Storage                              Storage                   Storage
            Node                                 Node                      Node


                          FIG: Improved Distributed Apriori


Prepared By- Ahlam Shakeel Ahmed Ansari                                              15
TIME (MS)




                               SUPPORT FACTOR
             Graph: Performance of Distributed Apriori and Apriori



    Prepared By- Ahlam Shakeel Ahmed Ansari                          16
PROPOSED
                  SOLUTION
Prepared By- Ahlam Shakeel Ahmed Ansari   17
5


                               Input Dataset                          Worker Servers
                                                             6

                  Decryption               Encryption        4
                                                                      Website Interface

                                                             7
                           Crypto-Unit
                  3

                                                             2

                               Task Queue

                                Task Log
                                                                       8

                                               Storage




                                                                             1

                                                            Browser
                                                                                          18
Prepared By- Ahlam Shakeel Ahmed Ansari              User
Forecasting
                        Report


                                                Select the Image that
               Encrypt the Report with
                                                user has selected as a
                      the key
                                                          key


                   Secure Forecasting
                        Report
               Encryption


                                  FIG: Encryption Unit




Prepared By- Ahlam Shakeel Ahmed Ansari                                  19
Encrypted
                      Forecasting
                    Report Request



                  Decrypt the Report
                                                Select the Image key
                Request using the key



                    Report Request

              Decryption

                                   FIG: Decryption Unit




Prepared By- Ahlam Shakeel Ahmed Ansari                                20
Example
• Let’s take an example to understand the architecture in a
  better way. There is a super market that has wide range of
  products and it keeps track of all it customers and what
  things they have shopped and accordingly the super mart
  provides them with offers.

• Now the super mart marketing manager wants to know how
  many products are sold in association i.e. if a customer
  purchases a book he is likely to purchase a pen or pencil
  with it, and if he/she purchase a pencil the its likely that
  he/she will purchase an eraser or sharpener with it, so that
  the marketing manager can devise a marketing strategy
  accordingly to lure the customer and increase its sales.
Prepared By- Ahlam Shakeel Ahmed Ansari               21
CONCLUSION
Prepared By- Ahlam Shakeel Ahmed Ansari   22
By use of cloud computing we are
  provided with cheap and efficient solutions
  of storing and analyzing mass data. The
  companies that opt for public cloud storage
  and secure cloud mining can increase their
  sales and develop new marketing strategy by
  simply using predictive analysis as the cost
  incurred in the set up is also low as compared
  to setting up a data ware house for the
  company.

Prepared By- Ahlam Shakeel Ahmed Ansari   23
Prepared By- Ahlam Shakeel Ahmed Ansari   24
Prepared By- Ahlam Shakeel Ahmed Ansari   25
REFERENCE
1. A Weiss. “Computing in Clouds”, ACM Networker, 11(4):18-
   25, Dec.2007.
2. R Buyya, CS Yeo, S Venugopal, Market-Oriented Cloud
   Computing:Vision, Hype, and Reality for Delivering IT
   Services as Computing Utilities. Proceedings of the 2008
   10th IEEE International Conference on High Performance
   Computing and Communications, Vol.00, pp, 5-13, 2008.
3. Storage Networking Industry Association and the Open Grid
   Forum, Cloud Storage for Cloud Computing, pp. 4-7, Storage
   Networking Industry Association (September 2009).



Prepared By- Ahlam Shakeel Ahmed Ansari               26
4. U.Fayyad, G. Piatetsky-Shapiro, and P.Smyth, “From data
   mining to knowledge discovery in databases”, AI Magazine,
   Vol. 17, 1996, pp.37-54.
5. Huimin Wang , Guihua Nie, Kui Fu, “Distributed data mining
   based on semantic web and grid”, 2009 International
   Conference on Computational Intelligence and Natural
   Computing.
6. Lingjuan Li, Min Zhang, “The Strategy of Mining Association
   Rule Based on Cloud Computing”, 2011 International
   Conference on Business Computing and Global
   Informatization.


Prepared By- Ahlam Shakeel Ahmed Ansari                27
7. Shao Feng jing, Yu Zhong qing. Principle and
   Algorithm of Data Mining [M]. Beijing: China
   WaterPower Press, 2003. 2, 126-170.

8. Ansari Ahlam, “Cloud Computing Security using
   Hybrid Distributed Intrusion Detection System”,
   International Journal of Advances in Management,
   Technology & Engineering Sciences, 2012

9. http://www.focus.com/fyi/operations/10-largest-
   databases-in-the-world/
Prepared By- Ahlam Shakeel Ahmed Ansari           28

Más contenido relacionado

La actualidad más candente

Cisco entel summit2010
Cisco entel summit2010Cisco entel summit2010
Cisco entel summit2010Entel
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012Lew Tucker
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyPrivate cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyTudor Damian
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud BusinessACMBangalore
 
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdf
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdfIntel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdf
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdfOpenStack Foundation
 
Private Cloud - Harbour MSP
Private Cloud - Harbour MSPPrivate Cloud - Harbour MSP
Private Cloud - Harbour MSPGPorterHarbour
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...Web2Present
 
Nevmug Green Pages Cisco Nexus January 2009
Nevmug   Green Pages Cisco   Nexus January 2009Nevmug   Green Pages Cisco   Nexus January 2009
Nevmug Green Pages Cisco Nexus January 2009csharney
 
Open stack in action hp cloud openstack
Open stack in action  hp cloud  openstackOpen stack in action  hp cloud  openstack
Open stack in action hp cloud openstackeNovance
 
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Prolifics
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
Peter Coffee at share2010seattle
Peter Coffee at share2010seattlePeter Coffee at share2010seattle
Peter Coffee at share2010seattlePeter Coffee
 
5 Cloud Commandments - Why Cloud Management Makes Sense
5 Cloud Commandments - Why Cloud Management Makes Sense5 Cloud Commandments - Why Cloud Management Makes Sense
5 Cloud Commandments - Why Cloud Management Makes SenseRightScale
 
Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud Emulex Corporation
 
Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...Ciro Puglisi
 

La actualidad más candente (18)

Cisco entel summit2010
Cisco entel summit2010Cisco entel summit2010
Cisco entel summit2010
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyPrivate cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
Cloud Computing in Organization
Cloud Computing in OrganizationCloud Computing in Organization
Cloud Computing in Organization
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud Business
 
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdf
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdfIntel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdf
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdf
 
Private Cloud - Harbour MSP
Private Cloud - Harbour MSPPrivate Cloud - Harbour MSP
Private Cloud - Harbour MSP
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
 
Nevmug Green Pages Cisco Nexus January 2009
Nevmug   Green Pages Cisco   Nexus January 2009Nevmug   Green Pages Cisco   Nexus January 2009
Nevmug Green Pages Cisco Nexus January 2009
 
Open stack in action hp cloud openstack
Open stack in action  hp cloud  openstackOpen stack in action  hp cloud  openstack
Open stack in action hp cloud openstack
 
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Peter Coffee at share2010seattle
Peter Coffee at share2010seattlePeter Coffee at share2010seattle
Peter Coffee at share2010seattle
 
5 Cloud Commandments - Why Cloud Management Makes Sense
5 Cloud Commandments - Why Cloud Management Makes Sense5 Cloud Commandments - Why Cloud Management Makes Sense
5 Cloud Commandments - Why Cloud Management Makes Sense
 
Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud
 
Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...Virtualisation with service management as enabler for cloud computing - Kingd...
Virtualisation with service management as enabler for cloud computing - Kingd...
 

Similar a Secure cloud mining By ahlam

8 Securities & AWS Journey to the Cloud
8 Securities & AWS Journey to the Cloud8 Securities & AWS Journey to the Cloud
8 Securities & AWS Journey to the Cloud8 Securities
 
eNovance Make Your Cloud
eNovance Make Your CloudeNovance Make Your Cloud
eNovance Make Your CloudeNovance
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingTriompheConsulting
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
RightScale Sydney Customer Appreciation Day
RightScale Sydney Customer Appreciation DayRightScale Sydney Customer Appreciation Day
RightScale Sydney Customer Appreciation DayAmazon Web Services
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerIBM Danmark
 
OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...
OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...
OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...Michael Fork
 
synquery platform
synquery platformsynquery platform
synquery platformEastCloud
 
Cloud State V02
Cloud State V02Cloud State V02
Cloud State V02mgion
 
Business Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop FinalBusiness Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop FinalMarc Crudgington, MBA
 
AI Scalability for the Next Decade
AI Scalability for the Next DecadeAI Scalability for the Next Decade
AI Scalability for the Next DecadePaula Koziol
 
Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10David Linthicum
 
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and FutureOpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and FutureMichael Fork
 
Hanu cloud computing expertise
Hanu cloud computing expertiseHanu cloud computing expertise
Hanu cloud computing expertiseHanu Software
 
Building your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeBuilding your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeMicrosoft Singapore
 
Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share nmaka
 
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...CloudAngels
 
Big Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumBig Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumIntelAPAC
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudreshmaroberts
 

Similar a Secure cloud mining By ahlam (20)

8 Securities & AWS Journey to the Cloud
8 Securities & AWS Journey to the Cloud8 Securities & AWS Journey to the Cloud
8 Securities & AWS Journey to the Cloud
 
eNovance Make Your Cloud
eNovance Make Your CloudeNovance Make Your Cloud
eNovance Make Your Cloud
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
RightScale Sydney Customer Appreciation Day
RightScale Sydney Customer Appreciation DayRightScale Sydney Customer Appreciation Day
RightScale Sydney Customer Appreciation Day
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf Feger
 
OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...
OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...
OpenStack Atlanta Summit - Build an OpenStack Cluster Before Lunch, Scale Glo...
 
synquery platform
synquery platformsynquery platform
synquery platform
 
Cloud State V02
Cloud State V02Cloud State V02
Cloud State V02
 
Business Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop FinalBusiness Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop Final
 
AI Scalability for the Next Decade
AI Scalability for the Next DecadeAI Scalability for the Next Decade
AI Scalability for the Next Decade
 
An enterprise journey in the Cloud
An enterprise journey in the CloudAn enterprise journey in the Cloud
An enterprise journey in the Cloud
 
Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10
 
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and FutureOpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
 
Hanu cloud computing expertise
Hanu cloud computing expertiseHanu cloud computing expertise
Hanu cloud computing expertise
 
Building your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeBuilding your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison lee
 
Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share
 
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
 
Big Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumBig Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick Buddenbaum
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 

Más de أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

Más de أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 

Último

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Último (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Secure cloud mining By ahlam

  • 1. SECURE CLOUD MINING Internal Guide Presented By Prof. K.K. Devadkar Ahlam Shakeel A. Ansari
  • 2. Outline • Abstract • Introduction • Cloud Storage • Data Mining • Proposed Architecture • Conclusion Prepared By- Ahlam Shakeel Ahmed Ansari 2
  • 3. ABSTRACT Prepared By- Ahlam Shakeel Ahmed Ansari 3
  • 4. Cloud computing provides cheap and efficient solutions of storing and analyzing mass data and it aims to power up the next generation data centers. Many companies are opting for cloud storage and shifting their data ware house over cloud; hence it is important to use an efficient and effective data mining strategy to mine the cloud storage to extract interesting patterns and relationship between variables in large databases. Prepared By- Ahlam Shakeel Ahmed Ansari 4
  • 5. These data patterns are nothing but forecasting or predictions that can be used by the companies in near future to increase their sales, develop its new marketing strategy. But if the cloud used is public cloud then the predictions that are generated as a result of mining should be secure from attacks such as interception. Hence we propose a Secure Cloud Mining (SCM) architecture that will generate a Secure Forecasting Report (SFR) for the companies that will use cloud mining. Prepared By- Ahlam Shakeel Ahmed Ansari 5
  • 6. INTRODUCTION Prepared By- Ahlam Shakeel Ahmed Ansari 6
  • 7. Publish Inform scale Interact web Integrate Transact Prepared By- Ahlam Shakeel Ahmed Ansari Discover (intelligence) Semantic discovery Automate (discovery) HPC, cloud Data-intensive Social media and networking Data marketplace and analytics time 7 deep web Evolution of Internet Computing
  • 8. Evolution of Computing Mainframe Personal Computer Client - Server Web Services Cloud Computing Prepared By- Ahlam Shakeel Ahmed Ansari 8
  • 9. • Cloud distributes the computing tasks to the resource pool constituted of a large number of computers, so that a variety of application systems can obtain computing power, storage space and a variety of software services on demand. Prepared By- Ahlam Shakeel Ahmed Ansari 9
  • 10. • A public cloud is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. • The main benefits of using a public cloud service are: – Easy and inexpensive set-up because hardware, application and bandwidth costs are covered by the provider. – Scalability to meet needs. – No wasted resources because you pay for what you use. Prepared By- Ahlam Shakeel Ahmed Ansari 10
  • 11. • We use the distributed association rule mining algorithm for generating the prediction reports. • In this seminar an architecture is proposed that can be used by the companies for prediction analytics so they can device some marketing strategies accordingly by mining their data over the cloud and that provides them with a secure forecasting report. Prepared By- Ahlam Shakeel Ahmed Ansari 11
  • 12. CLOUD STORAGE Prepared By- Ahlam Shakeel Ahmed Ansari 12
  • 13. MOBILE PC REMOTE DESKTOP Cloud Storage DATABASE REMOTE SERVER NOTEBOOK TABLET PC FIG: Overview of Cloud Storage Prepared By- Ahlam Shakeel Ahmed Ansari 13
  • 14. DATA MINING Prepared By- Ahlam Shakeel Ahmed Ansari 14
  • 15. Calculate Calculate Confidence & broad Confidence & broad cast it to other nodes cast it to other nodes Accept the global Accept the global confidence and confidence and generate item set generate item set Storage Storage Storage Node Node Node FIG: Improved Distributed Apriori Prepared By- Ahlam Shakeel Ahmed Ansari 15
  • 16. TIME (MS) SUPPORT FACTOR Graph: Performance of Distributed Apriori and Apriori Prepared By- Ahlam Shakeel Ahmed Ansari 16
  • 17. PROPOSED SOLUTION Prepared By- Ahlam Shakeel Ahmed Ansari 17
  • 18. 5 Input Dataset Worker Servers 6 Decryption Encryption 4 Website Interface 7 Crypto-Unit 3 2 Task Queue Task Log 8 Storage 1 Browser 18 Prepared By- Ahlam Shakeel Ahmed Ansari User
  • 19. Forecasting Report Select the Image that Encrypt the Report with user has selected as a the key key Secure Forecasting Report Encryption FIG: Encryption Unit Prepared By- Ahlam Shakeel Ahmed Ansari 19
  • 20. Encrypted Forecasting Report Request Decrypt the Report Select the Image key Request using the key Report Request Decryption FIG: Decryption Unit Prepared By- Ahlam Shakeel Ahmed Ansari 20
  • 21. Example • Let’s take an example to understand the architecture in a better way. There is a super market that has wide range of products and it keeps track of all it customers and what things they have shopped and accordingly the super mart provides them with offers. • Now the super mart marketing manager wants to know how many products are sold in association i.e. if a customer purchases a book he is likely to purchase a pen or pencil with it, and if he/she purchase a pencil the its likely that he/she will purchase an eraser or sharpener with it, so that the marketing manager can devise a marketing strategy accordingly to lure the customer and increase its sales. Prepared By- Ahlam Shakeel Ahmed Ansari 21
  • 22. CONCLUSION Prepared By- Ahlam Shakeel Ahmed Ansari 22
  • 23. By use of cloud computing we are provided with cheap and efficient solutions of storing and analyzing mass data. The companies that opt for public cloud storage and secure cloud mining can increase their sales and develop new marketing strategy by simply using predictive analysis as the cost incurred in the set up is also low as compared to setting up a data ware house for the company. Prepared By- Ahlam Shakeel Ahmed Ansari 23
  • 24. Prepared By- Ahlam Shakeel Ahmed Ansari 24
  • 25. Prepared By- Ahlam Shakeel Ahmed Ansari 25
  • 26. REFERENCE 1. A Weiss. “Computing in Clouds”, ACM Networker, 11(4):18- 25, Dec.2007. 2. R Buyya, CS Yeo, S Venugopal, Market-Oriented Cloud Computing:Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications, Vol.00, pp, 5-13, 2008. 3. Storage Networking Industry Association and the Open Grid Forum, Cloud Storage for Cloud Computing, pp. 4-7, Storage Networking Industry Association (September 2009). Prepared By- Ahlam Shakeel Ahmed Ansari 26
  • 27. 4. U.Fayyad, G. Piatetsky-Shapiro, and P.Smyth, “From data mining to knowledge discovery in databases”, AI Magazine, Vol. 17, 1996, pp.37-54. 5. Huimin Wang , Guihua Nie, Kui Fu, “Distributed data mining based on semantic web and grid”, 2009 International Conference on Computational Intelligence and Natural Computing. 6. Lingjuan Li, Min Zhang, “The Strategy of Mining Association Rule Based on Cloud Computing”, 2011 International Conference on Business Computing and Global Informatization. Prepared By- Ahlam Shakeel Ahmed Ansari 27
  • 28. 7. Shao Feng jing, Yu Zhong qing. Principle and Algorithm of Data Mining [M]. Beijing: China WaterPower Press, 2003. 2, 126-170. 8. Ansari Ahlam, “Cloud Computing Security using Hybrid Distributed Intrusion Detection System”, International Journal of Advances in Management, Technology & Engineering Sciences, 2012 9. http://www.focus.com/fyi/operations/10-largest- databases-in-the-world/ Prepared By- Ahlam Shakeel Ahmed Ansari 28