SECURE CLOUD MINING    Internal Guide        Presented ByProf. K.K. Devadkar   Ahlam Shakeel A. Ansari
Outline•   Abstract•   Introduction•   Cloud Storage•   Data Mining•   Proposed Architecture•   ConclusionPrepared By- Ahl...
ABSTRACTPrepared By- Ahlam Shakeel Ahmed Ansari   3
Cloud computing provides cheap and      efficient solutions of storing and analyzing      mass data and it aims to power u...
These data patterns are nothing but   forecasting or predictions that can be used   by the companies in near future to inc...
INTRODUCTIONPrepared By- Ahlam Shakeel Ahmed Ansari   6
Publish                                                  Inform                                           scale           ...
Evolution of Computing          Mainframe                        Personal                       Computer                  ...
• Cloud distributes the computing tasks to the  resource pool constituted of a large number  of computers, so that a varie...
• A public cloud is one based on the standard cloud computing  model, in which a service provider makes resources, such as...
• We use the distributed association rule mining algorithm for  generating the prediction reports.• In this seminar an arc...
CLOUD                   STORAGEPrepared By- Ahlam Shakeel Ahmed Ansari   12
MOBILE              PC                                                               REMOTE DESKTOP                       ...
DATA MININGPrepared By- Ahlam Shakeel Ahmed Ansari   14
Calculate                Calculate                                          Confidence & broad       Confidence & broad   ...
TIME (MS)                               SUPPORT FACTOR             Graph: Performance of Distributed Apriori and Apriori  ...
PROPOSED                  SOLUTIONPrepared By- Ahlam Shakeel Ahmed Ansari   17
5                               Input Dataset                          Worker Servers                                     ...
Forecasting                        Report                                                Select the Image that            ...
Encrypted                      Forecasting                    Report Request                  Decrypt the Report          ...
Example• Let’s take an example to understand the architecture in a  better way. There is a super market that has wide rang...
CONCLUSIONPrepared By- Ahlam Shakeel Ahmed Ansari   22
By use of cloud computing we are  provided with cheap and efficient solutions  of storing and analyzing mass data. The  co...
Prepared By- Ahlam Shakeel Ahmed Ansari   24
Prepared By- Ahlam Shakeel Ahmed Ansari   25
REFERENCE1. A Weiss. “Computing in Clouds”, ACM Networker, 11(4):18-   25, Dec.2007.2. R Buyya, CS Yeo, S Venugopal, Marke...
4. U.Fayyad, G. Piatetsky-Shapiro, and P.Smyth, “From data   mining to knowledge discovery in databases”, AI Magazine,   V...
7. Shao Feng jing, Yu Zhong qing. Principle and   Algorithm of Data Mining [M]. Beijing: China   WaterPower Press, 2003. 2...
Upcoming SlideShare
Loading in...5
×

Secure cloud mining By ahlam

454

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
454
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Secure cloud mining By ahlam

  1. 1. SECURE CLOUD MINING Internal Guide Presented ByProf. K.K. Devadkar Ahlam Shakeel A. Ansari
  2. 2. Outline• Abstract• Introduction• Cloud Storage• Data Mining• Proposed Architecture• ConclusionPrepared By- Ahlam Shakeel Ahmed Ansari 2
  3. 3. ABSTRACTPrepared By- Ahlam Shakeel Ahmed Ansari 3
  4. 4. Cloud computing provides cheap and efficient solutions of storing and analyzing mass data and it aims to power up the next generation data centers. Many companies are opting for cloud storage and shifting their data ware house over cloud; hence it is important to use an efficient and effective data mining strategy to mine the cloud storage to extract interesting patterns and relationship between variables in large databases.Prepared By- Ahlam Shakeel Ahmed Ansari 4
  5. 5. These data patterns are nothing but forecasting or predictions that can be used by the companies in near future to increase their sales, develop its new marketing strategy. But if the cloud used is public cloud then the predictions that are generated as a result of mining should be secure from attacks such as interception. Hence we propose a Secure Cloud Mining (SCM) architecture that will generate a Secure Forecasting Report (SFR) for the companies that will use cloud mining.Prepared By- Ahlam Shakeel Ahmed Ansari 5
  6. 6. INTRODUCTIONPrepared By- Ahlam Shakeel Ahmed Ansari 6
  7. 7. Publish Inform scale Interact web Integrate TransactPrepared By- Ahlam Shakeel Ahmed Ansari Discover (intelligence) Semantic discovery Automate (discovery) HPC, cloud Data-intensive Social media and networking Data marketplace and analytics time 7 deep web Evolution of Internet Computing
  8. 8. Evolution of Computing Mainframe Personal Computer Client - Server Web Services Cloud ComputingPrepared By- Ahlam Shakeel Ahmed Ansari 8
  9. 9. • Cloud distributes the computing tasks to the resource pool constituted of a large number of computers, so that a variety of application systems can obtain computing power, storage space and a variety of software services on demand.Prepared By- Ahlam Shakeel Ahmed Ansari 9
  10. 10. • A public cloud is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model.• The main benefits of using a public cloud service are: – Easy and inexpensive set-up because hardware, application and bandwidth costs are covered by the provider. – Scalability to meet needs. – No wasted resources because you pay for what you use.Prepared By- Ahlam Shakeel Ahmed Ansari 10
  11. 11. • We use the distributed association rule mining algorithm for generating the prediction reports.• In this seminar an architecture is proposed that can be used by the companies for prediction analytics so they can device some marketing strategies accordingly by mining their data over the cloud and that provides them with a secure forecasting report.Prepared By- Ahlam Shakeel Ahmed Ansari 11
  12. 12. CLOUD STORAGEPrepared By- Ahlam Shakeel Ahmed Ansari 12
  13. 13. MOBILE PC REMOTE DESKTOP Cloud Storage DATABASE REMOTE SERVER NOTEBOOK TABLET PC FIG: Overview of Cloud StoragePrepared By- Ahlam Shakeel Ahmed Ansari 13
  14. 14. DATA MININGPrepared By- Ahlam Shakeel Ahmed Ansari 14
  15. 15. Calculate Calculate Confidence & broad Confidence & broad cast it to other nodes cast it to other nodes Accept the global Accept the global confidence and confidence and generate item set generate item set Storage Storage Storage Node Node Node FIG: Improved Distributed AprioriPrepared By- Ahlam Shakeel Ahmed Ansari 15
  16. 16. TIME (MS) SUPPORT FACTOR Graph: Performance of Distributed Apriori and Apriori Prepared By- Ahlam Shakeel Ahmed Ansari 16
  17. 17. PROPOSED SOLUTIONPrepared By- Ahlam Shakeel Ahmed Ansari 17
  18. 18. 5 Input Dataset Worker Servers 6 Decryption Encryption 4 Website Interface 7 Crypto-Unit 3 2 Task Queue Task Log 8 Storage 1 Browser 18Prepared By- Ahlam Shakeel Ahmed Ansari User
  19. 19. Forecasting Report Select the Image that Encrypt the Report with user has selected as a the key key Secure Forecasting Report Encryption FIG: Encryption UnitPrepared By- Ahlam Shakeel Ahmed Ansari 19
  20. 20. Encrypted Forecasting Report Request Decrypt the Report Select the Image key Request using the key Report Request Decryption FIG: Decryption UnitPrepared By- Ahlam Shakeel Ahmed Ansari 20
  21. 21. Example• Let’s take an example to understand the architecture in a better way. There is a super market that has wide range of products and it keeps track of all it customers and what things they have shopped and accordingly the super mart provides them with offers.• Now the super mart marketing manager wants to know how many products are sold in association i.e. if a customer purchases a book he is likely to purchase a pen or pencil with it, and if he/she purchase a pencil the its likely that he/she will purchase an eraser or sharpener with it, so that the marketing manager can devise a marketing strategy accordingly to lure the customer and increase its sales.Prepared By- Ahlam Shakeel Ahmed Ansari 21
  22. 22. CONCLUSIONPrepared By- Ahlam Shakeel Ahmed Ansari 22
  23. 23. By use of cloud computing we are provided with cheap and efficient solutions of storing and analyzing mass data. The companies that opt for public cloud storage and secure cloud mining can increase their sales and develop new marketing strategy by simply using predictive analysis as the cost incurred in the set up is also low as compared to setting up a data ware house for the company.Prepared By- Ahlam Shakeel Ahmed Ansari 23
  24. 24. Prepared By- Ahlam Shakeel Ahmed Ansari 24
  25. 25. Prepared By- Ahlam Shakeel Ahmed Ansari 25
  26. 26. REFERENCE1. A Weiss. “Computing in Clouds”, ACM Networker, 11(4):18- 25, Dec.2007.2. R Buyya, CS Yeo, S Venugopal, Market-Oriented Cloud Computing:Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications, Vol.00, pp, 5-13, 2008.3. Storage Networking Industry Association and the Open Grid Forum, Cloud Storage for Cloud Computing, pp. 4-7, Storage Networking Industry Association (September 2009).Prepared By- Ahlam Shakeel Ahmed Ansari 26
  27. 27. 4. U.Fayyad, G. Piatetsky-Shapiro, and P.Smyth, “From data mining to knowledge discovery in databases”, AI Magazine, Vol. 17, 1996, pp.37-54.5. Huimin Wang , Guihua Nie, Kui Fu, “Distributed data mining based on semantic web and grid”, 2009 International Conference on Computational Intelligence and Natural Computing.6. Lingjuan Li, Min Zhang, “The Strategy of Mining Association Rule Based on Cloud Computing”, 2011 International Conference on Business Computing and Global Informatization.Prepared By- Ahlam Shakeel Ahmed Ansari 27
  28. 28. 7. Shao Feng jing, Yu Zhong qing. Principle and Algorithm of Data Mining [M]. Beijing: China WaterPower Press, 2003. 2, 126-170.8. Ansari Ahlam, “Cloud Computing Security using Hybrid Distributed Intrusion Detection System”, International Journal of Advances in Management, Technology & Engineering Sciences, 20129. http://www.focus.com/fyi/operations/10-largest- databases-in-the-world/Prepared By- Ahlam Shakeel Ahmed Ansari 28

×