Application of Intelligent Data Mining Approach in Securing the Cloud Computing

Abstract

Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits

Authors and Affiliations

Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi

Keywords

Related Articles

Decision Making Systems for Managing Business Processes in Enterprises Groups

In the current economic realities, the forms of integration business entities through the creation of enterprise groups (EGs), reorganized from industry structures or created a new by acquiring existing companies, are be...

Feed Forward Neural Network Based Eye Localization and Recognition Using Hough Transform

Eye detection is a pre-requisite stage for many applications such as face recognition, iris recognition, eye tracking, fatigue detection based on eye-blink count and eye-directed instruction control. As the location of...

Fast Hybrid String Matching Algorithm based on the Quick-Skip and Tuned Boyer-Moore Algorithms

The string matching problem is considered as one of the most interesting research areas in the computer science field because it can be applied in many essential different applications such as intrusion detection, search...

Formalization of UML Composite Structure using Colored Petri Nets

Design specification and requirement analysis, during development process involved in transformation of real world problems to software system are subjected to severe issues owing to involvement of semantics. Though, for...

A Novel Modeling based Agent Cellular Automata for Advanced Residential Mobility Applications

Nowadays, residential mobility (RM) is usually interconnected with other urban phenomena to give more realistic and effective to the simulation models in order to support urban planners and decision makers. Recent RM res...

Download PDF file
  • EP ID EP101844
  • DOI 10.14569/IJACSA.2016.070921
  • Views 97
  • Downloads 0

How To Cite

Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi (2016). Application of Intelligent Data Mining Approach in Securing the Cloud Computing. International Journal of Advanced Computer Science & Applications, 7(9), 151-159. https://europub.co.uk/articles/-A-101844