Application of Intelligent Data Mining Approach in Securing the Cloud Computing

被引:0
|
作者
Said, Hanna M. [1 ]
Alyoubi, Bader A. [2 ]
El Emary, Ibrahim [3 ]
Alyoubi, Adel A. [2 ]
机构
[1] Ain Shams Univ, Fac Comp & Informat Sci, Cairo, Egypt
[2] Univ Jeddah, Coll Business, MIS, Jeddah, Saudi Arabia
[3] King Abdulaziz Univ, Dept Informat Sci, Jeddah, Saudi Arabia
关键词
Cloud computing; Cloud security issue; Data mining; Naive Bayes; multilayer percepton; Support vector machine; decision tree (C4.5); and Partial Tree (PART);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits
引用
收藏
页码:151 / 159
页数:9
相关论文
共 50 条
  • [1] Research on the application of cloud computing in data mining algorithm
    Fang, Jia-Juan, 1600, TeknoScienze, Viale Brianza,22, Milano, 20127, Italy (28):
  • [2] Analysis of the Data Mining Application Based on Cloud Computing
    Li Xiaohui
    Liu Wei
    Wang Lele
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2426 - 2429
  • [3] Research on the application of cloud computing in data mining algorithm
    Fang, Jia-Juan
    Li, Xiao-Ling
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 1055 - 1060
  • [4] A MODIFIED CRYPTOGRAPHIC APPROACH FOR SECURING DISTRIBUTED DATA STORAGE IN CLOUD COMPUTING
    Reddy, M. Rajasekhar
    Akilandeswari, R.
    Priyadarshini, S.
    Karthikeyan, B.
    Ponmani, E.
    2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 131 - 139
  • [5] Accelerated algorithm for intelligent mining of communication data in cloud computing environment
    Jiang, Xiao-ling
    Zhang, Hui
    WEB INTELLIGENCE, 2020, 18 (02) : 145 - 153
  • [6] Mobile Cloud Computing Framework for Securing Data
    Ikram, Arfa Arslaan
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Abid, Rabia
    Crichigno, Jorge
    Srivastava, Gautam
    2021 44th International Conference on Telecommunications and Signal Processing, TSP 2021, 2021, : 309 - 315
  • [7] Mobile Cloud Computing Framework for Securing Data
    Ikram, Arfa Arslaan
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Abid, Rabia
    Crichigno, Jorge
    Srivastava, Gautam
    2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2021, : 309 - 315
  • [8] Application of Cloud Computing and Data Mining in Smart Tourism System
    Fan Tongke
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM - MANAGEMENT, INNOVATION AND DEVELOPMENT, 2015, : 141 - 144
  • [9] Application of data mining techniques in cloud computing: A literature review
    Yildirim, Pelin
    Birant, Derya
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2018, 24 (02): : 336 - 343
  • [10] Study and Application of Big Data Mining Based on Cloud Computing
    Luo, Jinwei
    Li, Chunfei
    Huang, Fuping
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 221 - 224