Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : T.Sujitha, V.Saravanakumar

Volume 01 Issue o5  Year 2014  

ISSN no:  2348-3121

Page no: 162-168

Abstract—Data Mining is employed for extracting probably helpful info from information. The mixing of information mining techniques into traditional day-after-day activities has become common place. Data mining techniques and applications are much required within the cloud computing paradigm. The implementation of mining techniques through cloud computing can enable the users to retrieve significant information from just about integrated data warehouse that reduces the prices of infrastructure and storage. The association rule mining is one methodology to mining those cloud knowledge, and it’s used to realize the link among these knowledge. Enterprises typically store knowledge in internal storage and install firewalls to safeguard against inducers to access the info by exploitation two completely different algorithms. Privacy preserving Sensitive Pattern Mining is employed to secure the info gift within the cloud databases. The cloud information is responsible for storage, encryption and decryption of information. During this proposal, the cloud data encryption turning into additional necessary as a result of keeping cloud data safe from hackers. A database accessible to client from the cloud and delivered to users on demand via the net from a cloud information provider’s server. Then analyze the encryption and decryption for sensitive pattern mining by using two completely different algorithms in cloud information that makes effective knowledge utilization.

KeywordsAssociation rule mining, Cloud Computing, Cloud database, data mining, encryption and decryption, Privacy preserving.


[1]. R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In Proc. (1994) Int. Conf.Very Large Data Bases, pages 487-499, Santiago, Chile, September (1994).
[2]. Archana Tomar, Prof. Vineet Richhariya, Prof. R.K. Pandey, “A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database”,International Journal of Computer Applications (0975 – 8887) Volume 16– No.5, February (2011).
[3]. Daniel J. Abadi, “Report- Data Management in the Cloud: Limitations and Opportunities”, January 4, (2013).
[4]. Gunjan Gupta, Rama Chawla, “Review on Encryption Ciphers of Cryptography in Network Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, July 2012, ISSN: 2277 128X.
[5]. Himel Dev, Tanmoy Sen, Madhusudan Basak and Mohammed Eunus Ali, “An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks”, page 1106-1115. IEEE Computer Society, (2012).
[6]. Indu Arora and Dr. Anu Gupta, “Cloud Databases: A Paradigm Shift in Databases”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 ISSN (Online): 1694-0814.
[7]. Jasonbaker, Chrisbond, “Megastore: Providing Scalable, Highly Available Storage for Interactive Services”, 5th Biennial Conference on Innovative Data Systems Research (CIDR’11) January 9-12, (2011), Asilomar, California, USA.
[8]. Jiyi Wu, Jianlin Zhang, Zhijie Lin, Jiehui Ju, “Recent Advances in Cloud Storage”, Proceedings of the Third International Symposium on Computer Science and Computational Technology(ISCSCT ’10), Jiaozuo, P. R. China, 14-15,August 2010, pp. 151-154, ISBN 978-952-5726-10-7.
[9]. A. M. Khattak, A. M. Khan, Sungyoung Lee, Young-Koo Lee, “Analyzing Association Rule Mining and Clustering on Sales Day Data with XLMiner and Weka”, International Journal of Database Theory and Application Vol. 3, No. 1, March, (2010).
[10]. T.V.Mahendra, N.Deepika, N.Keasava Rao, “Data Mining for High Performance Data Cloud using Association Rule Mining”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, ISSN: 2277 128X, January (2012).
[11]. Richard Chow, Philippe Golle, Markus Jacobson, “Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control”,CCSW’09, November 13, (2009), Chicago, Illinois, USA.
[12]. Ruxandra-Ştefania PETRE, “Data mining in Cloud Computing”, Database Systems Journal Vol. III, No. 3 (2012).
[13]. Shikha Sharma, “An Extended Method for Privacy Preserving Association Rule Mining”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, ISSN: 2277 128X, October (2012).
[14]. Sudipto Das, Divyakant Agrawal, Amr El Abbadi, “G-Store: A Scalable Data Store for Transactional Multi key Access in the Cloud”, SoCC’10, June 10–11, (2010), Indianapolis, Indiana, USA.
[15]. Mrs. Tejaswini Abhijit Hilage & R. V. Kulkarni, “Review of Literature on Data Mining”, IJRRAS, Vol 10, Issue1, January (2012).
[16]. Zhu Tianxiang, Sun Shuhui, Zhang Dan, Liu Xin, “Data Mining of the Association Rules Based on the Cloud Database”, Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013).

Full Pdf Paper-Click Here

Scroll Up