Application of Intelligent Data Mining Approach in Securing the Cloud Computing

Abstract

Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits

Authors and Affiliations

Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi

Keywords

Related Articles

An SMS-SQL based On-board system to manage and query a database

Technological advances of recent years have facilitated the use of embedded systems. They are part of our everyday life. Thanks to them, electronic devices are increasingly present in our lives in many forms: Mobile phon...

Smoothness Measure for Image Fusion in Discrete Cosine Transform

The aim of image fusion is to generate high-quality images using information from source images. The fused image contains more information than any of the source images. Image fusion using transforms is more effective th...

Energy Saving EDF Scheduling for Wireless Sensors on Variable Voltage Processors

Advances in micro technology has led to the development of miniaturized sensor nodes with wireless communication to perform several real-time computations. These systems are deployed wherever it is not possible to mainta...

Hidden Markov Models (HMMs) and Security Applications

The Hidden Markov models (HMMs) are statistical models used in various communities and applications. Such applications include speech recognition, mental task classification, biological analysis, and anomaly detection. I...

Design of Mobile Application for Travelers to Transport Baggage and Handle Check-in Process

In this paper, an Android based application called ‘Baggage Check-in Handling System’ is developed for helping travelers/passengers transport their baggage to the airport and handle the check-in process. It is merging th...

Download PDF file
  • EP ID EP101844
  • DOI 10.14569/IJACSA.2016.070921
  • Views 90
  • Downloads 0

How To Cite

Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi (2016). Application of Intelligent Data Mining Approach in Securing the Cloud Computing. International Journal of Advanced Computer Science & Applications, 7(9), 151-159. https://europub.co.uk/articles/-A-101844