Big Data Handling Approach for Unauthorized Cloud Computing Access

被引:4
|
作者
Razaque, Abdul [1 ]
Shaldanbayeva, Nazerke [1 ]
Alotaibi, Bandar [2 ,3 ]
Alotaibi, Munif [4 ]
Murat, Akhmetov [5 ]
Alotaibi, Aziz [6 ]
机构
[1] Int Informat Technol Univ, Dept Cybersecur, Alma Ata 050000, Kazakhstan
[2] Univ Tabuk, Sensor Networks & Cellular Syst Res Ctr, Tabuk 71491, Saudi Arabia
[3] Univ Tabuk, Dept Informat Technol, Tabuk 71491, Saudi Arabia
[4] Shaqra Univ, Dept Comp Sci, Shaqra 11961, Saudi Arabia
[5] LN Gumilyov Eurasian Natl Univ, Dept Informat Secur, Astana 010008, Kazakhstan
[6] Taif Univ, Coll Computers & Informat Technol, Dept Comp Sci, At Taif 21944, Saudi Arabia
关键词
data security; data handling; access control; unauthorized access; cloud computing; SECURITY; ENCRYPTION; MODEL;
D O I
10.3390/electronics11010137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Big data analytics in Cloud computing: an overview
    Berisha, Blend
    Mëziu, Endrit
    Shabani, Isak
    [J]. Journal of Cloud Computing, 2022, 11 (01)
  • [42] Big Data in Cloud Computing: Features and Issues
    Neves, Pedro Caldeira
    Schmerl, Bradley
    Camara, Javier
    Bernardino, Jorge
    [J]. IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA, 2016, : 307 - 314
  • [43] Cloud computing and big data: Technologies and applications
    Zbakh, Mostapha
    Bakhouya, Mohamed
    Essaaidi, Mohamed
    Manneback, Pierre
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (12):
  • [44] Challenges of Cloud Computing & Big Data Analytics
    Gupta, Anita
    Mehrotra, Abhay
    Khan, P. M.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1112 - 1115
  • [45] CLASSIFICATION OF BIG POINT CLOUD DATA USING CLOUD COMPUTING
    Liu, Kun
    Boehm, Jan
    [J]. ISPRS GEOSPATIAL WEEK 2015, 2015, 40-3 (W3): : 553 - 557
  • [46] A Systematic Review of Cloud Computing, Big Data and Databases on the Cloud
    Litchfield, Alan T.
    Althouse, Jacqui
    [J]. AMCIS 2014 PROCEEDINGS, 2014,
  • [47] Big Data Handling Over Cloud for Internet of Things
    Goyal, Tarun
    Rathi, Rakesh
    Jain, Vinesh Kumar
    Pilli, Emmanuel Shubhakar
    Mazumdar, Arka Prokash
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2018, 13 (02) : 37 - 47
  • [48] Efficient and Secure Cloud Storage for Handling Big Data
    Kumar, Arjun
    Lee, HoonJae
    Singh, Rajeev Pratap
    [J]. 2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 162 - 166
  • [49] RECENT DEVELOPMENTS IN CLOUD COMPUTING, DATA STORAGE AND HANDLING
    Verma, Alakh K.
    Sinha, Dipendra K.
    [J]. PROCEEDINGS OF THE ASME CONFERENCE ON INFORMATION STORAGE AND PROCESSING SYSTEMS, 2013, 2013,
  • [50] A Novel Data Access Scheme in Cloud Computing
    Gao, Xiaowei
    Jiang, Zemin
    Jiang, Rui
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 124 - 127