LEADER |
03741nam a22003257a 4500 |
001 |
1505509 |
041 |
|
|
|a eng
|
100 |
|
|
|9 534553
|a طاهر، رسل ممتاز
|e مؤلف
|
245 |
|
|
|a Privacy in Cloud Computing: An Intelligent Approach
|
260 |
|
|
|a عمان
|c 2019
|
300 |
|
|
|a 1 - 55
|
336 |
|
|
|a رسائل جامعية
|
502 |
|
|
|b رسالة ماجستير
|c جامعة الاسراء الخاصة
|f كلية الدراسات العليا
|g الاردن
|o 0041
|
520 |
|
|
|a Due to the abundance of data that needs large storage space in various fields, cloud computing has become a haven for many companies, institutions and many other companies. Despite all the benefit, cloud computing faces many challenges in many areas including security and privacy issues. Main problems concerning, how to maintain data stored in the cloud, and how to gain customer confidence. All these security issues and privacy issues encourage us to propose a developed approach that contributes to increase security and privacy in cloud environment. In this work, the developed approach is proposed to solve three security and privacy issues. Malware and Network Intrusion Detection (NID), privacy and access control to prevent unauthorized users from accessing client’s data without their permission, data integrity to prevent data updating and modification without data owner awareness. To solve NID problem, set of normal-access rules are generated based on CIC-IDS2017 dataset, at which data mining approach (decision tree J48) is used to improve the classification accuracy and reduce feature-set before generating set of rules that are used to detect normal-access records. The system accuracy reaches 99.8%, which outperforms (or comparable) to previous related researches. To preserve privacy and access control, a set of policies stick to the data file by the owner utilizing sticky policy approach. Data are encrypted using Advanced Encryption Standard (AES) ciphering algorithm as a second level of data protecting to preserve privacy. Finally, a simple block-chain approach is used to preserve data integrity, at which set of trustees (chain list) are identified by the data owner along with more confident level of accessing polices. A data modification done by a trusty member (chain member) will be reported to all trusty group including the owner. This will preserve auditing data changing (by who, when, in addition to last data updates). The developed approach is a privacy and data integrity service (PDIS) layer to be part of the cloud computing main service model. The proposed service layer is placed on top of the other service layers. PDIS is a private infrastructure deployment model, which is managed and maintained in organization. Final, a web based application is implemented to act as a case study to check flow- control of the proposed PDIS.
|
653 |
|
|
|a الحوسبة السحابية
|a الخصوصية
|a تشفير البيانات
|a التحكم في الوصول
|
700 |
|
|
|9 46739
|a Samawi, Venus W.
|e Advisor
|
700 |
|
|
|9 534556
|a Al-Hroob, Aysh
|e Advisor
|
856 |
|
|
|u 9802-021-002-0041-T.pdf
|y صفحة العنوان
|
856 |
|
|
|u 9802-021-002-0041-A.pdf
|y المستخلص
|
856 |
|
|
|u 9802-021-002-0041-C.pdf
|y قائمة المحتويات
|
856 |
|
|
|u 9802-021-002-0041-F.pdf
|y 24 صفحة الأولى
|
856 |
|
|
|u 9802-021-002-0041-1.pdf
|y 1 الفصل
|
856 |
|
|
|u 9802-021-002-0041-2.pdf
|y 2 الفصل
|
856 |
|
|
|u 9802-021-002-0041-3.pdf
|y 3 الفصل
|
856 |
|
|
|u 9802-021-002-0041-4.pdf
|y 4 الفصل
|
856 |
|
|
|u 9802-021-002-0041-O.pdf
|y الخاتمة
|
856 |
|
|
|u 9802-021-002-0041-R.pdf
|y المصادر والمراجع
|
930 |
|
|
|d y
|
995 |
|
|
|a Dissertations
|
999 |
|
|
|c 990993
|d 990993
|