Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Просмотр элемента 
  •   Главная
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Engineering
  • Просмотр элемента
  •   Главная
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Engineering
  • Просмотр элемента
JavaScript is disabled for your browser. Some features of this site may not work without it.

Big Data Handling Approach for Unauthorized Cloud Computing Access

Thumbnail
Автор
Razaque, Abdul
Shaldanbayeva, Nazerke
Alotaibi, Bandar
Alotaibi, Munif
Akhmetov, Murat
Alotaibi, Aziz
Дата
2022
Редактор
Electronics
ISSN
1754-1786
xmlui.dri2xhtml.METS-1.0.item-identifier-citation
Razaque, A.; Shaldanbayeva, N.; Alotaibi, B.; Alotaibi, M.; Murat, A.; Alotaibi, A. Big Data Handling Approach for Unauthorized Cloud Computing Access. Electronics 2022, 11, 137. https://doi.org/10.3390/ electronics11010137
Аннотации
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
URI
http://rep.enu.kz/handle/enu/19944
Открыть
Big-data-handling-approach-for-unauthorized-cloud-computing-accessElectronics-Switzerland.pdf (2.183Mb)
Collections
  • Engineering[651]
Показать полную информацию
CORE Recommender

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Контакты
Яндекс.Метрика
Научная библиотека | Контакты
 

Просмотр

Весь DSpaceСообщества и коллекцииДата публикацииАвторыНазванияТематикаЭта коллекцияДата публикацииАвторыНазванияТематика

Моя учетная запись

ВойтиРегистрация

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Контакты
Яндекс.Метрика
Научная библиотека | Контакты