Cloud query Based allocation system in the Dynamic environment of Log Based Personalized Web Mining

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-28 Number-5
Year of Publication : 2015
Authors : Mr. Rajeshwar rao kodipaka, Mr. Sanjeeva Polepaka, Mr.M.Amarendhar Reddy
  10.14445/22312803/IJCTT-V28P143

MLA

Mr. Rajeshwar rao kodipaka, Mr. Sanjeeva Polepaka, Mr.M.Amarendhar Reddy  "Cloud query Based allocation system in the Dynamic environment of Log Based Personalized Web Mining". International Journal of Computer Trends and Technology (IJCTT) V28(5):217-221, October 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Information Technology and its implementation are vast and stretched as the endless ocean. Its beauty lies in the heart of the mother land India, where the main theme gets constructed. For Instance if we keep the Virtual implementation of IT is the cloud which makes us enabling the in the optimization of resource, economy and many more compare to the classical technology. In this paper, we try to put forward the cost reduction system which we call as pay per use and network. In the System of the elasticity which we can as the balancing the data load, making the environment dynamic, number of servers and the optimizing the traffic of the network., where we play an important role in the upgrading of technology which usually we call it as the Technology of change. concept of the caching the first step of reducing the network, making the virtual node which depends on the peak of the data load in order to balance the computing environment which we call as cloud computing. Technologically its meaning remains virtual, but in reality while exposing to a real world of enterprise solution.

References
[1] Thomas S. J. Schwarz and Ethan L. Miller. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, Washington, DC, USA, 2006.
[2] F. Sebe´, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, “Efficient Remote Data Possession Checking in Critical Information Infrastructures,” IEEE Trans. Knowledge Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
[3] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Fourth Int’l Conf. Security Privacy Comm. Networks, pp. 1-10, 2008.
[4] C. Erway, A. Ku¨ pc¸u¨, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer Comm. Security, pp. 213-222, 2009.
[5] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research Computer Security, pp. 355-370, 2009.
[6] A.F. Barsoum and M.A. Hasan, “Provable Possession and Replication of Data over Cloud Servers,” Technical Report 2010/ 32, Centre for Applied Cryptographic Research, http:// www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-32.pdf. 2010.
[7] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple-Replica Provable Data Possession,” Proc. 28th Int’l Conf. Distributed Computing Systems, pp. 411-420, 2008.
[8] A.F. Barsoum and M.A. Hasan, “On Verifying Dynamic Multiple Data Copies over Cloud Servers,” Technical Report 2011/447, Cryptology Eprint Archive, http://eprint.iacr.org/, 2011.
[9] K.D. Bowers, A. Juels, and A. Oprea, “HAIL: A High- Availability and Integrity Layer for Cloud Storage,” Proc. 16th ACM Conf. Computer Comm. Security, pp. 187-198, 2009.
[10] Y. Dodis, S. Vadhan, and D. Wichs, “Proofs of Retrievability via Hardness Amplification,” Proc. Sixth Theory Cryptography Conf. Theory Cryptography, 2009.
[11] A. Juels and B.S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. 14th ACM Conf. Computer Comm. Security, pp. 584-597, 2007.
[12] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory Appl. Cryptology Information Security, pp. 90-107, 2008.
[13] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. Second USENIX Conf. File Storage Technologies, 2003.
[14] E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, “SiRiUS: Securing Remote entrusted Storage,” Proc. Network Distributed System Security Symp., 2003.

Keywords
Cloud computing, cost efficiency, differential query services, privacy, personalized web search, utility, risk, profile.