Applying Data Mining Techniques in Fog Computing

Publication Date : 31/03/2016

Author(s) :

Megha S. Mahajan , Pallavi Laware , Swapnali Jadhav , Shivam Singh , Yashpal Singh.

Volume/Issue :
Volume 2
Issue 3
(03 - 2016)

Abstract :

It gives strong security to protect our data on any account though the password s known to hacker.It works on the behavior matching of owner and currently available behavior.For that we had used the naive Bayes algorithm and back end to hadoop.

No. of Downloads :