Application of Intelligent Data Mining Approach in Securing the Cloud Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 9
Abstract
Cloud computing is a modern term refers to a model for emerging computing, where it is possible to use machines in large data centers for delivering services in a scalable manner, so corporations has become in need for large scale inexpensive computing. Recently, several governments have begun to utilize cloud computing architectures, applications and platforms for meeting the needs of their constituents and delivering services. Security occupies the first rank of obstacles that face cloud computing for governmental agencies and businesses. Cloud computing is surrounded by many risks that may have major effects on services and information supported via this technology. Also, Cloud Computing is one of the promising technology in which the scientific community has recently encountered. Cloud computing is related to other research areas such as distributed and grid computing, Service-Oriented Architecture, and virtualization, as cloud computing inherited their limitations and advancements. It is possible to exploit new opportunities for security. This paper aim is to discuss and analyze how achieve mitigation for cloud computing security risks as a basic step towards obtaining secure and safe environment for cloud computing. The results showed that, Using a simple decision tree model Chaid algorithm security rating for classifying approach is a robust technique that enables the decision-maker to measure the extent of cloud securing, and the provided services. It was proved throughout this paper that policies, standards, and controls are critical in management process to safeguard and protect the systems as well as data. The management process should analyze and understand cloud computing risks for protecting systems and data from security exploits
Authors and Affiliations
Hanna Said, Ibrahim El Emary, Bader Alyoubi, Adel Alyoubi
Gene Optimized Deep Neural Round Robin Workflow Scheduling in Cloud
Workflow scheduling is a key problem to be solved in the cloud to increases the quality of services. Few research works have been designed for performing workflow scheduling using different techniques. But, scheduling pe...
Methods of Isolation for Application Traces Using Virtual Machines and Shadow Copies
To improve the user's experience, almost all applications save usage data: web browsers save history and cookies, chat programs save message archives and so on. However, this data can be confidential and may compromise t...
Query Expansion based on Explicit-Relevant Feedback and Synonyms for English Quran Translation Information Retrieval
Search engines are commonly present as information retrieval applications that help to retrieve relevant information from different domain areas. The crucial part of improving the quality of search engine is based on que...
Utilizing Feature Selection in Identifying Predicting Factors of Student Retention
Student retention is an important issue faced by Philippine higher education institutions. It is a key concern that needs to be addressed for the reason that the knowledge they gain can contribute to the economic and com...
Generating a Highlight Moments Summary Video of Apolitical Event using Ontological Analysis on Social Media Speech Sentiment
Numerous viewers choose to watch political or presidential debates highlights via TV or internet, rather than seeing the whole debate nowadays, which requires a lot of time. However, the task of making a debate summary,...