MARCH VOLUME 1 – ISSUE 10 (MARCH 2016) Detecting Fraudulent Activities to Bump Rankings of Mobile Applications Mrs.K.Sangeeta, Mr.Dr.Ramesh Challagundla & Srinivasu Gubbala Enhanced Cloud Access Control Methodologies to Protect Sensitive and Policy Information by Hiding Attributes Jerripothu Ravindra Babu, Mangalagiri Venkatesh & Dr.Ramesh Challagundla Dealing With the Concept of Deviation in the Mining Process Dr.K.Sathish Kumar, Kiran Kumar Dharanikota & G.Rajesh The Adoption of a More Accurate Predictor Database Queries G.Rajesh, Kiran Kumar Dharanikota & Dr.K.Sathish Kumar Implementation of Remotely Verifying Integrity of Regeneration Codes Method in Cloud Environment for Safeguarding Outsourced Data Anil Nukathoti & Pilli Dharmendra Kumar