Application of Intelligent Data Mining Approach in Securing the Cloud Computing

被引:0
作者
Said, Hanna M. [1 ]
Alyoubi, Bader A. [2 ]
El Emary, Ibrahim [3 ]
Alyoubi, Adel A. [2 ]
机构
[1] Ain Shams Univ, Fac Comp & Informat Sci, Cairo, Egypt
[2] Univ Jeddah, Coll Business, MIS, Jeddah, Saudi Arabia
[3] King Abdulaziz Univ, Dept Informat Sci, Jeddah, Saudi Arabia
关键词
Cloud computing; Cloud security issue; Data mining; Naive Bayes; multilayer percepton; Support vector machine; decision tree (C4.5); and Partial Tree (PART);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits
引用
收藏
页码:151 / 159
页数:9
相关论文
共 50 条
  • [41] Construction of Big Data Mining Platform Based on Cloud Computing
    Sun, Mali
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 375 - 378
  • [42] Design and Implementation of Data Mining Platform Based on the Cloud Computing
    Zhu Jia
    Zhang Ping
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 163 - 165
  • [43] Mobile Cloud Computing Standard approach to protecting and securing of mobile cloud ecosystems
    Kumar, Ranbijay
    Rajalakshmi, S.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 663 - 669
  • [44] Examination System in the Cloud Computing Platform based on Data Mining
    Li Xiao-Feng
    Wang Jian-Hua
    Gao Wei-Wei
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1605 - 1608
  • [45] Research on the Data Mining Based on Cloud Computing
    Luo, Laixi
    Zhu, Yu
    PROCEEDINGS OF 2020 CHINA MARKETING INTERNATIONAL CONFERENCE (WEB CONFERENCING): MARKETING AND MANAGEMENT IN THE DIGITAL AGE, 2020, : 494 - 505
  • [46] Research on parallel data processing of data mining platform in the background of cloud computing
    Bu, Lingrui
    Zhang, Hui
    Xing, Haiyan
    Wu, Lijun
    JOURNAL OF INTELLIGENT SYSTEMS, 2021, 30 (01) : 479 - 486
  • [47] DATA MINING USING HIERARCHICAL VIRTUAL K-MEANS APPROACH INTEGRATING DATA FRAGMENTS IN CLOUD COMPUTING ENVIRONMENT
    Nair, T. R. Gopalakrishnan
    Madhuri, K. Lakshmi
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 230 - 234
  • [48] Construction of multi tier distributed computing data mining system in cloud computing environment
    Xia Wendong
    Liu Yuanfeng
    Chen Deli
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1664 - 1667
  • [49] NUYA: An Encrypted Mechanism for Securing Cloud Data from Data Mining Attacks
    Singh, Nitish Kumar
    Patel, Yashwant Singh
    Das, Utpalendu
    Chatterjee, Ananya
    2014 INTERNATIONAL CONFERENCE ON DATA MINING AND INTELLIGENT COMPUTING (ICDMIC), 2014,
  • [50] Application Of Cloud Computing In Biomedicine Big Data Analysis Cloud Computing In Big Data
    Yang, Tianyi
    Zhao, Yang
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,