Privacy in cloud computing : an intelligent approach
Dissertant
Thesis advisor
al-Harub, Ayish M.
Samawi, Venus W.
University
Isra University
Faculty
Faculty of Information Technology
Department
Department Software Engineering
University Country
Jordan
Degree
Master
Degree Date
2019
English Abstract
Due to the abundance of data that needs large storage space in various fields, cloud computing has become a haven for many companies, institutions and many other companies.
Despite all the benefit, cloud computing faces many challenges in many areas including security and privacy issues.
Main problems concerning, how to maintain data stored in the cloud, and how to gain customer confidence.
All these security issues and privacy issues encourage us to propose a developed approach that contributes to increase security and privacy in cloud environment.
In this work, the developed approach is proposed to solve three security and privacy issues.
Malware and Network Intrusion Detection (NID), privacy and access control to prevent unauthorized users from accessing client’s data without their permission, data integrity to prevent data updating and modification without data owner awareness.
To solve NID problem, set of normal-access rules are generated based on CIC-IDS2017 dataset, at which data mining approach (decision tree J48) is used to improve the classification accuracy and reduce feature-set before generating set of rules that are used to detect normal-access records.
The system accuracy reaches 99.8%, which outperforms (or comparable) to previous related researches.
To preserve privacy and access control, a set of policies stick to the data file by the owner utilizing sticky policy approach.
Data are encrypted using Advanced Encryption Standard (AES) ciphering algorithm as a second level of data protecting to preserve privacy.
Finally, a simple block-chain approach is used to preserve data integrity, at which set of trustees (chain list) are identified by the data owner along with more confident level of accessing polices.
A data modification done by a trusty member (chain member) will be reported to all trusty group including the owner.
This will preserve auditing data changing (by who, when, in addition to last data updates).
The developed approach is a privacy and data integrity service (PDIS) layer to be part of the cloud computing main service model.
The proposed service layer is placed on top of the other service layers.
PDIS is a private infrastructure deployment model, which is managed and maintained in organization.
Final, a web based application is implemented to act as a case study to check flowcontrol of the proposed PDIS.
Main Subjects
Engineering & Technology Sciences (Multidisciplinary)
Topics
No. of Pages
55
Table of Contents
Table of contents.
Abstract.
Chapter One : Introduction.
Chapter Two : Theoretical concepts and literatures.
Chapter Three : Privacy and data integrity service (PDIS) : the proposed approach.
Chapter Four : PDIS : implementation and analysis of findings.
Chapter Five : Conclusion and future work.
References.
American Psychological Association (APA)
Tahir, Rasul Mumtaz. (2019). Privacy in cloud computing : an intelligent approach. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-896668
Modern Language Association (MLA)
Tahir, Rasul Mumtaz. Privacy in cloud computing : an intelligent approach. (Master's theses Theses and Dissertations Master). Isra University. (2019).
https://search.emarefa.net/detail/BIM-896668
American Medical Association (AMA)
Tahir, Rasul Mumtaz. (2019). Privacy in cloud computing : an intelligent approach. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-896668
Language
English
Data Type
Arab Theses
Record ID
BIM-896668