Académique Documents
Professionnel Documents
Culture Documents
Abstract
The ideal support of Information and communication
technology leads to the enlargement of Big Data
processing mechanisms like Data Mining. It is an
exercise of extracting concealed as well as valuable
information from raw Data. Today, with the rapid
growth of the Information Technology the size of the
data has been increased from KB level PB level. The
objective of data mining process is also additional and
more problematical, so the data mining algorithms are
needed to be more competent. Cloud computing
paradigm can provide the infrastructure to gigantic and
multifaceted data of data mining, as well as innovative
challenging issues for data mining. The cloud computing
researches are materialized. This Script deals with the
study of how data mining key features are used in cloud
computing and also converse about the basic concept of
cloud computing services and the role of data mining
algorithms for the effectiveness and sketches out how
data mining is recycled in cloud computing paradigm.
1. Introduction
With the rapid growth of processing and storage
technologies and the accomplishment of the Internet,
computing resources have become cost effective, more
authoritative and more collectively available than ever
before. This technological propensity has enabled the
awareness of a new and innovative computing model
called Cloud Computing. NIST definition of cloud
computing: Cloud computing is a model for enabling
convenient, on-demand network access to a shared pool
of configurable computing resources (e.g. networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.
Today, the cloud computing plays a vital role and
undertaking broad changes in the way IT services are
designed, delivered, consumed, and managed. The boom
in cloud computing over the past few years has led to a
situation that is common to many innovations and new
technologies: Cloud computing was coined for what
happens when applications and facilities are moved into
www.ijsret.org
982
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 9, September 2015
CLOUD
NAME
Clustering
Classification
Association
Regression
Attribute
Importance
Anomaly
Detection
Feature
Extraction
KEY FEATURES
Useful for exploring data and finding natural groupings. Members of a cluster are more
like each other than they are like members of a different cluster. Common examples
include finding new customer segments and life sciences discovery.
Most commonly used technique for predicting a specific outcome such as response / noresponse, high / medium / low value customer, likely to buy / not buy.
Find the rules associated with frequently co-occurring items, used for market basket
analysis. It can be used to determine the level of generalization and ensure that a pattern
covers a sufficient number of cases.
Technique for predicting a continuous numerical outcome such a customer lifetime value,
house value, process yield rates.
Ranks attributes according to strength of relationship with target attribute. Use cases
include finding factors most associated with customers who respond to an offer, factors
most associated with healthy patients.
Identifies unusual or suspicious cases based on deviation from the norm. Common
examples include health care fraud, expense report fraud, and tax compliance.
Produces new attributes as linear combination of existing attributes. Applicable for text
data, latent semantic analysis, data compression, data decomposition and projection, and
pattern recognition.
Table.1.Cloud Name and its Key Features
www.ijsret.org
983
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 9, September 2015
www.ijsret.org
984
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 9, September 2015
7. Conclusion
Popularity of cloud computing is increasing day by day
in distributed computing environment. There is a
growing trend of using cloud environments for storage
and data processing needs. To use the full potential of
cloud computing, data is transferred, processed, retrieved
and stored by external cloud providers. Data owners are
very skeptical to place their data outside their own
control sphere. Their main concerns are the
confidentiality, integrity, security and methods of mining
the data from the cloud.
References
[1] Ananthanarayanan R, Gupta K et al (2009) Cloud
analytics: do we really need to reinvent the storage
stack? In: Proc of HotCloud.
www.ijsret.org
985