Big Data Handling Approach for Unauthorized Cloud Computing Access

被引:4
|
作者
Razaque, Abdul [1 ]
Shaldanbayeva, Nazerke [1 ]
Alotaibi, Bandar [2 ,3 ]
Alotaibi, Munif [4 ]
Murat, Akhmetov [5 ]
Alotaibi, Aziz [6 ]
机构
[1] Int Informat Technol Univ, Dept Cybersecur, Alma Ata 050000, Kazakhstan
[2] Univ Tabuk, Sensor Networks & Cellular Syst Res Ctr, Tabuk 71491, Saudi Arabia
[3] Univ Tabuk, Dept Informat Technol, Tabuk 71491, Saudi Arabia
[4] Shaqra Univ, Dept Comp Sci, Shaqra 11961, Saudi Arabia
[5] LN Gumilyov Eurasian Natl Univ, Dept Informat Secur, Astana 010008, Kazakhstan
[6] Taif Univ, Coll Computers & Informat Technol, Dept Comp Sci, At Taif 21944, Saudi Arabia
关键词
data security; data handling; access control; unauthorized access; cloud computing; SECURITY; ENCRYPTION; MODEL;
D O I
10.3390/electronics11010137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] DATA FUSION IN CLOUD COMPUTING:BIG DATA APPROACH
    Szuster, Piotr
    Molina, Jose M.
    Garcia-Herrero, Jesus
    Kolodziej, Joanna
    [J]. PROCEEDINGS - 31ST EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2017, 2017, : 569 - 575
  • [2] Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing
    Moustafa, Nour
    Creech, Gideon
    Sitnikova, Elena
    Keshk, Marwa
    [J]. 2017 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2017,
  • [3] Teaching Big Data and Cloud Computing: A Modular Approach
    Deb, Debzani
    Cousins, Sebastian
    Fuad, Muztaba
    [J]. 2018 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW 2018), 2018, : 377 - 383
  • [4] Application Of Cloud Computing In Biomedicine Big Data Analysis Cloud Computing In Big Data
    Yang, Tianyi
    Zhao, Yang
    [J]. 2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [5] Cloud Computing and Big Data
    Hsu, Ching-Hsien
    Tang, Chunming
    Esteves, Rui M.
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 995 - 997
  • [6] Big data and cloud computing
    Shrestha, Rasu B.
    [J]. APPLIED RADIOLOGY, 2014, 43 (03) : 32 - 34
  • [7] Toward a big data approach for indexing encrypted data in Cloud Computing
    Kaci, Abdellah
    Bouabana-Tebibel, Thouraya
    Rachedi, Abderrezak
    Yahiaoui, Chafia
    [J]. SECURITY AND PRIVACY, 2019, 2 (03):
  • [8] Hybird cloud computing: A New Approach for Big Data Era
    Boonchieng, Ekkarat
    [J]. 2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015,
  • [9] Integrating big data and cloud computing topics into the computing curricula: A modular approach
    Deb, Debzani
    Fuad, Muztaba
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 157 : 303 - 315
  • [10] Geospatial cloud computing and big data
    Yang, Chaowei Phil
    [J]. COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2017, 61 : 119 - 119