Application of Intelligent Data Mining Approach in Securing the Cloud Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 9
Abstract
Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits
Authors and Affiliations
Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
Ameliorating the lifetime in heterogeneous wireless sensor network is an important task because the sensor nodes are limited in the resource energy. The best way to improve a WSN lifetime is the clustering based algorith...
Automatic Control of Colonoscope Movement for Modern Colonoscopy
The paper presents the mathematical realization of the trajectory that the colonoscope should have in the medical intervention, as well as the mathematical demonstration of the functions that make up the colonoscope. The...
Rab-KAMS: A Reproducible Knowledge Management System with Visualization for Preserving Rabbit Farming and Production Knowledge
The sudden rise in rural-to-urban migration has been a key challenge threatening food security and most especially the survival of Rabbit Farming and Production (RFP) in Sub-Saharan Africa. Currently, significant knowled...
Control of Grid Connected Three-Phase Inverter for Hybrid Renewable Systems using Sliding Mode Controller
This paper presents a power control approach of a grid connected 3-phase inverter for hybrid renewable energy systems that consists of wind generator, flywheel energy storage system and diesel generator. A sliding contro...
A Review of Bluetooth based Scatternet for Mobile Ad hoc Networks
Bluetooth based networking is an emerging and promising technology that takes small area networking to an enhanced and better level of communication. Bluetooth specification supports piconet formation. However, scatterne...