Application of Intelligent Data Mining Approach in Securing the Cloud Computing

Abstract

Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits

Authors and Affiliations

Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi

Keywords

Related Articles

Adaptive Case Management Framework to Develop Case-based Emergency Response System

Emergency response to crisis, disaster, or catastrophe incidents is a clear example of knowledge-intensive and collaboration-heavy process facing all public safety-related organizations. Software systems to support emerg...

A Case Study for the IONEX CODE-Database Processing Tool Software: Ionospheric Anomalies before the Mw 8.2 Earthquake in Mexico on September 7, 2017

A software tool was developed in the Imaging Processing Research laboratory (INTI-Lab) that automatically downloads several IONEX files around a specific user input date and also performs statistical calculations to look...

Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems

IoT-based systems have considerable dynamic behavior and heterogeneous technology participants. The corresponding threats and security operations are also complex to handle. Traditional security solutions may not be appr...

An Efficient Spectral Amplitude Coding (SAC) Technique for Optical CDMA System using Wavelength Division Multiplexing (WDM) Concepts

This article introduces an improved method for Optical Code Division Multiple Access system (OCDMA). In this scheme, a hybrid technique is used in which Wavelength Division Multiplexing (WDM) is merged with Spectral Ampl...

SentiTFIDF – Sentiment Classification using Relative Term Frequency Inverse Document Frequency

Sentiment Classification refers to the computational techniques for classifying whether the sentiments of text are positive or negative. Statistical Techniques based on Term Presence and Term Frequency, using Support Vec...

Download PDF file
  • EP ID EP101844
  • DOI 10.14569/IJACSA.2016.070921
  • Views 73
  • Downloads 0

How To Cite

Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi (2016). Application of Intelligent Data Mining Approach in Securing the Cloud Computing. International Journal of Advanced Computer Science & Applications, 7(9), 151-159. https://europub.co.uk/articles/-A-101844