Application of Intelligent Data Mining Approach in Securing the Cloud Computing

被引:0
|
作者
Said, Hanna M. [1 ]
Alyoubi, Bader A. [2 ]
El Emary, Ibrahim [3 ]
Alyoubi, Adel A. [2 ]
机构
[1] Ain Shams Univ, Fac Comp & Informat Sci, Cairo, Egypt
[2] Univ Jeddah, Coll Business, MIS, Jeddah, Saudi Arabia
[3] King Abdulaziz Univ, Dept Informat Sci, Jeddah, Saudi Arabia
关键词
Cloud computing; Cloud security issue; Data mining; Naive Bayes; multilayer percepton; Support vector machine; decision tree (C4.5); and Partial Tree (PART);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits
引用
收藏
页码:151 / 159
页数:9
相关论文
共 50 条
  • [21] A Hybrid Cloud Computing Approach for Intelligent Processing and Storage of Scientific Data
    Horat, David
    Quevedo, Eduardo
    Quesada-Arencibia, Alexis
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 182 - 188
  • [22] Cloud Computing Data Mining To SCADA for Energy Management
    Gupta, Richa
    Moinuddin
    Kumar, Parmod
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [23] A Proposal for the Specification of Data Mining Services in Cloud Computing
    Parra-Royon, Manuel
    Benitez, Jose M.
    CLOSER: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2018, : 541 - 548
  • [24] Research on Data Mining Algorithm Based on Cloud Computing
    Mai Xiao-Dong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 1752 - 1756
  • [25] Cloud Computing Based Data Mining of Medical Information
    Wang, Lihua
    Zhang, Ze
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 978 - 982
  • [26] The application research of cloud computing in the intelligent transportation
    Pang, Ling
    Ji, Song
    Sun, Tong
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 1100 - 1102
  • [27] Mobile Cloud Computing Standard approach to protecting and securing of mobile cloud ecosystems
    Kumar, Ranbijay
    Rajalakshmi, S.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 663 - 669
  • [28] Lightweight Effective Encryption Algorithm for Securing Data in Cloud Computing
    Al-Attab, Basel Saleh
    Fadewar, H. S.
    Hodeish, Mahmoud E.
    COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 105 - 121
  • [29] Intelligent cryptography approach for secure distributed big data storage in cloud computing
    Li, Yibin
    Gai, Keke
    Qiu, Longfei
    Qiu, Meikang
    Zhao, Hui
    INFORMATION SCIENCES, 2017, 387 : 103 - 115
  • [30] Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
    Mughaid, Ala
    Obeidat, Ibrahim
    Abualigah, Laith
    Alzubi, Shadi
    Daoud, Mohammad Sh.
    Migdady, Hazem
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2123 - 2137