REPOSITORY.ENU

Big Data Handling Approach for Unauthorized Cloud Computing Access

Показать сокращенную информацию

dc.contributor.author Razaque, Abdul
dc.contributor.author Shaldanbayeva, Nazerke
dc.contributor.author Alotaibi, Bandar
dc.contributor.author Alotaibi, Munif
dc.contributor.author Akhmetov, Murat
dc.contributor.author Alotaibi, Aziz
dc.date.accessioned 2024-12-09T04:58:37Z
dc.date.available 2024-12-09T04:58:37Z
dc.date.issued 2022
dc.identifier.citation Razaque, A.; Shaldanbayeva, N.; Alotaibi, B.; Alotaibi, M.; Murat, A.; Alotaibi, A. Big Data Handling Approach for Unauthorized Cloud Computing Access. Electronics 2022, 11, 137. https://doi.org/10.3390/ electronics11010137 ru
dc.identifier.issn 1754-1786
dc.identifier.other doi.org/10.3390/ electronics11010137
dc.identifier.uri http://rep.enu.kz/handle/enu/19944
dc.description.abstract Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy. ru
dc.language.iso en ru
dc.publisher Electronics ru
dc.relation.ispartofseries 11, 137;
dc.subject data security ru
dc.subject data handling ru
dc.subject access control ru
dc.subject unauthorized access ru
dc.subject cloud computing ru
dc.title Big Data Handling Approach for Unauthorized Cloud Computing Access ru
dc.type Article ru


Файлы в этом документе

Данный элемент включен в следующие коллекции

Показать сокращенную информацию

Поиск в DSpace


Просмотр

Моя учетная запись