2022
DOI: 10.3390/electronics11010137
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Handling Approach for Unauthorized Cloud Computing Access

Abstract: Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data hand… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…However, it failed to utilize an elliptic curve-based cryptographic technique to reduce the network utilization in the cloud environment. Razaque, A., et al [4] developed a Hybrid Unauthorized Data Handling (HUDH) for unauthorized Cloud Computing Access, and effectively reduced the possibility of unauthorized data access under less computational cost in cloud computing, but it did not consider various quality of service parameters to increase the confidentiality of user access. Singamaneni, K.K., et al [5] devised a Quantum Hash-Centric Cipher Policy-Attribute-Based Encipherment (QH-CPABE) for Cloud Data Integrity and Confidentiality.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it failed to utilize an elliptic curve-based cryptographic technique to reduce the network utilization in the cloud environment. Razaque, A., et al [4] developed a Hybrid Unauthorized Data Handling (HUDH) for unauthorized Cloud Computing Access, and effectively reduced the possibility of unauthorized data access under less computational cost in cloud computing, but it did not consider various quality of service parameters to increase the confidentiality of user access. Singamaneni, K.K., et al [5] devised a Quantum Hash-Centric Cipher Policy-Attribute-Based Encipherment (QH-CPABE) for Cloud Data Integrity and Confidentiality.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, this method was not suitable for multimodal data analysis to provide security for cloud-based services. • The HUDH scheme used in [4] effectively enhanced the efficiency of encrypted data storage in the cloud computing environment. However, it failed to significantly calculate the ciphertext by combining it with the Spark computing framework.…”
Section: Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…For that purpose, the proposed framework was capable of providing a lightweight security solution with a minimum key size. A hybrid scheme combining data encryption, access control, and intrusion detection was proposed by Razaque et al for big data security in the cloud environment [31]. However, due to its hybrid nature, the procedure may be computationally expensive.…”
Section: Related Workmentioning
confidence: 99%
“…It requires the specification of all important events and conditions that should be taken into account and strong procedures of implementing options for combining; • collection of the data for estimation and prediction of CIS models' parameters. It concerns, first of all, information about vulnerabilities and cyber-attacks, and application of ML to calculate parameters; • the C5 approach should be added by proactive techniques for assessment and assurance of CIS dependability, cybersecurity, privacy, and resilience based on Big Data analytics [59,60] and machine learning [61] methods to analyze data and support decision-making about choice and combining and recombining models; • application of this approach for combining hidden MMs and SMMs to assess privacy [62] extending the model base. Institutional Review Board Statement: Not applicable.…”
mentioning
confidence: 99%