Privacy in cloud computing : an intelligent approach

Dissertant

Tahir, Rasul Mumtaz

Thesis advisor

al-Harub, Ayish M.
Samawi, Venus W.

University

Isra University

Faculty

Faculty of Information Technology

Department

Department Software Engineering

University Country

Jordan

Degree

Master

Degree Date

2019

English Abstract

Due to the abundance of data that needs large storage space in various fields, cloud computing has become a haven for many companies, institutions and many other companies.

Despite all the benefit, cloud computing faces many challenges in many areas including security and privacy issues.

Main problems concerning, how to maintain data stored in the cloud, and how to gain customer confidence.

All these security issues and privacy issues encourage us to propose a developed approach that contributes to increase security and privacy in cloud environment.

In this work, the developed approach is proposed to solve three security and privacy issues.

Malware and Network Intrusion Detection (NID), privacy and access control to prevent unauthorized users from accessing client’s data without their permission, data integrity to prevent data updating and modification without data owner awareness.

To solve NID problem, set of normal-access rules are generated based on CIC-IDS2017 dataset, at which data mining approach (decision tree J48) is used to improve the classification accuracy and reduce feature-set before generating set of rules that are used to detect normal-access records.

The system accuracy reaches 99.8%, which outperforms (or comparable) to previous related researches.

To preserve privacy and access control, a set of policies stick to the data file by the owner utilizing sticky policy approach.

Data are encrypted using Advanced Encryption Standard (AES) ciphering algorithm as a second level of data protecting to preserve privacy.

Finally, a simple block-chain approach is used to preserve data integrity, at which set of trustees (chain list) are identified by the data owner along with more confident level of accessing polices.

A data modification done by a trusty member (chain member) will be reported to all trusty group including the owner.

This will preserve auditing data changing (by who, when, in addition to last data updates).

The developed approach is a privacy and data integrity service (PDIS) layer to be part of the cloud computing main service model.

The proposed service layer is placed on top of the other service layers.

PDIS is a private infrastructure deployment model, which is managed and maintained in organization.

Final, a web based application is implemented to act as a case study to check flowcontrol of the proposed PDIS.

Main Subjects

Engineering & Technology Sciences (Multidisciplinary)

Topics

No. of Pages

55

Table of Contents

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Theoretical concepts and literatures.

Chapter Three : Privacy and data integrity service (PDIS) : the proposed approach.

Chapter Four : PDIS : implementation and analysis of findings.

Chapter Five : Conclusion and future work.

References.

American Psychological Association (APA)

Tahir, Rasul Mumtaz. (2019). Privacy in cloud computing : an intelligent approach. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-896668

Modern Language Association (MLA)

Tahir, Rasul Mumtaz. Privacy in cloud computing : an intelligent approach. (Master's theses Theses and Dissertations Master). Isra University. (2019).
https://search.emarefa.net/detail/BIM-896668

American Medical Association (AMA)

Tahir, Rasul Mumtaz. (2019). Privacy in cloud computing : an intelligent approach. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-896668

Language

English

Data Type

Arab Theses

Record ID

BIM-896668