Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Dynamic Data Mining Tool on Distributed Encrypted Data  
  Authors : Pranali M. Sonawane; Vikas K. Kumawat; Vijayalaxmi L. Balsane; Prachi B. Suryavanshi; Ramnath Banerjee
  Cite as:

 

Now-a-days the security of the system matters because system gets easily hacked, so deal with this problem. Here we introduce the 3d key generation. It generated from RGB colors and their priority. User data distributed in smaller parts and uploaded server side database. To maintain the security of data, data encryption and decryption is introduced and this task is done by AES and RC6 algorithm. J48, Fuzzy cmeans clustering algorithm, apriori classification algorithm are online data mining. Using online data mining tool we can predict multiple result with graphical representation.

 

Published In : IJCSN Journal Volume 3, Issue 3

Date of Publication : 01 June 2014

Pages : 08 - 11

Figures : 02

Tables : --

Publication Link : Dynamic Data Mining Tool on Distributed Encrypted Data

 

 

 

Pranali M. Sonawane : Position: Student Degree: Diploma in Computer Engineering (2011) Bachelor in Computer Engineering (2014)

Vikas K. Kumawat : Position: Student Degree: Bachelor in Computer Engineering (2014)

Vijayalaxmi L. Balsane : Position: Student Degree: Diploma in Computer Engineering (2011) Bachelor in Computer Engineering (2014)

Prachi B. Suryavanshi : Position: Student Degree: Diploma in Computer Engineering (2011) Bachelor in Computer Engineering (2014)

Prof. Ramnath Banerjee : Position: Professor Department of Computer Dr. D.Y. Patil Institute of Engineering & Technology Ambi, Pune.

 

 

 

 

 

 

 

Data distribution theory

Data mining

security

Data encryption and decryption

The proposed model explains a Secured Cost-Effective Multi-Web Storage (SCMCS) in web application, which seeks to provide each customer with better decision making for data storage.. Using SP user budget for storing data and quality of services can be achieved. By using the AES algorithm for encryption we provide security to data. Fuzzy c-means algorithm is used for data classification. By dividing and distributing customer’s data, proposed model shows its ability of providing a customer with a secured storage under his affordable budget.

 

 

 

 

 

 

 

 

 

[1] C. Wang, Sherman S.-M. Chow, Q. Wang, K. Ren, W. Lou, “Privacy preserving public auditing for secure web storage”, in InfoCom2010, IEEE, March 2010.

[2] B. Adler, Load balancing in the web: Tools, tips and techniques, http://www.rightscale.com/infocenter/whitepapers/ Load- Balancing-in-the-Web.pdf, 2012P.

[3] Ismail Butun and Ravi Sankar,2011.” Advanced Two Tier User Authentication Scheme for Heterogeneous Wireless Sensor Networks”. 2nd IEEE CCNC Research Student Workshop.

[4] Akash Kumar Mandal, Chandra Parakash, Mrs Archana Tiwari “Performance Evaluation of Cryptographic Algorithms: DES andAES”, IEEE Trans. on Electrical, Electronics and Computer Science, 2012.

[5] G. C. Karmakar and L. S. Dooley, A generic fuzzy rule based image segmentation algorithm, Pattern Recognition Letters, 23(10) (2002) 1215- 1227.

[6] ShufenZhang,ShuaiZhang,Xuebinchen, ShangzhuoWu, ”Analysis and Research of Web application system Instance”, 2010 second international Conference on Future Networks, IEEE.

[7] C.S. Yeo, R. Buyya1, M.D. de Assunção, et al. Utility Computing on Global Grids. Technical Report, GRIDSTR- 2006-7, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, 2006.

[8] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in web application,” in Proc. of IWQoS’09, July 2009, pp.1–9.