Показать сокращенную информацию

dc.contributor.authorRazaque, Abdul
dc.contributor.authorShaldanbayeva, Nazerke
dc.contributor.authorAlotaibi, Bandar
dc.contributor.authorAlotaibi, Munif
dc.contributor.authorAkhmetov, Murat
dc.contributor.authorAlotaibi, Aziz
dc.date.accessioned2024-12-09T04:58:37Z
dc.date.available2024-12-09T04:58:37Z
dc.date.issued2022
dc.identifier.citationRazaque, A.; Shaldanbayeva, N.; Alotaibi, B.; Alotaibi, M.; Murat, A.; Alotaibi, A. Big Data Handling Approach for Unauthorized Cloud Computing Access. Electronics 2022, 11, 137. https://doi.org/10.3390/ electronics11010137ru
dc.identifier.issn1754-1786
dc.identifier.otherdoi.org/10.3390/ electronics11010137
dc.identifier.urihttp://rep.enu.kz/handle/enu/19944
dc.description.abstractNowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.ru
dc.language.isoenru
dc.publisherElectronicsru
dc.relation.ispartofseries11, 137;
dc.subjectdata securityru
dc.subjectdata handlingru
dc.subjectaccess controlru
dc.subjectunauthorized accessru
dc.subjectcloud computingru
dc.titleBig Data Handling Approach for Unauthorized Cloud Computing Accessru
dc.typeArticleru


Файлы в этом документе

Thumbnail

Данный элемент включен в следующие коллекции

Показать сокращенную информацию