6 results on '"Razaque, Abdul"'
Search Results
2. Privacy preserving model: a new scheme for auditing cloud stakeholders
- Author
-
Razaque, Abdul and Rizvi, Syed S.
- Published
- 2017
- Full Text
- View/download PDF
3. Big Data Handling Approach for Unauthorized Cloud Computing Access.
- Author
-
Razaque, Abdul, Shaldanbayeva, Nazerke, Alotaibi, Bandar, Alotaibi, Munif, Murat, Akhmetov, and Alotaibi, Aziz
- Subjects
CLOUD computing ,BIG data ,ADVANCED Encryption Standard ,DATA encryption ,COMPUTER systems ,DATA security - Abstract
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey.
- Author
-
Razaque, Abdul, Frej, Mohamed Ben Haj, Alotaibi, Bandar, and Alotaibi, Munif
- Subjects
CLOUD computing ,CLOUD computing security measures ,AUDITORS ,PRIVACY ,SERVICE level agreements ,CONSUMER cooperatives - Abstract
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC's data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC's data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC's data by playing a malicious role. In this paper, we present the state of the art of cloud computing's privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA's privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
5. Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing.
- Author
-
Almiani, Muder, Abughazleh, Alia, Jararweh, Yaser, and Razaque, Abdul
- Subjects
- *
ARTIFICIAL neural networks , *BACK propagation , *DENIAL of service attacks , *CLOUD computing , *INTRUSION detection systems (Computer security) , *DEFENSE mechanisms (Psychology) - Abstract
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and delivery for their services. On the other hand, they widen the surface of malicious intrusions, which, in turn, without proper defense mechanisms, lessens their benefits to a certain degree. Among the biggest threats of malicious intrusions are those that belong to the Distributed Denial of Service (DDoS) family. Such type of attacks are challenging because DDoS attacks are elevated hard-to-absorbed threats and have a high degree of variability in types, design, and complexity. In this work, resilient backpropagation neural network was used to build an intelligent network intrusion detection model against the most modernistic DDoS attacks in the cloud-native computing environment. We evaluated our proposed model using the benchmarking Canadian Institute for Cybersecurity evaluation CICDDoS 2019 dataset. Our proposed detection model has achieved high reflective DDoS attack detection. Therefore, it is appropriate to defend against reflective DDoS attacks in containerized cloud-native platforms. Experimental results indicate that the DDoS attack detection accuracy of the proposed resilient neural network model is as high as 97.07% which outperforms most of the well-known learning models mentioned in the most related work. Moreover, the proposed model has achieved a competitive run time performance that highly meets the delay requirements of containerized cloud computing. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Deep recurrent neural network for IoT intrusion detection system.
- Author
-
Almiani, Muder, AbuGhazleh, Alia, Al-Rahayfeh, Amer, Atiewi, Saleh, and Razaque, Abdul
- Subjects
- *
RECURRENT neural networks , *CLOUD storage , *INTERNET of things , *CLOUD computing , *ARTIFICIAL intelligence , *SECURITY systems - Abstract
As a results of the large scale development of the Internet of Things (IoT), cloud computing capabilities including networking, data storage, management, and analytics are brought very close to the edge of networks forming Fog computing and enhancing transferring and processing of tremendous amount of data. As the Internet becomes more deeply integrated into our business operations through IoT platform, the desire for reliable and efficient connections increases as well. Fog and Cloud security is a topical issue associated with every data storage, managing or processing paradigm. Attacks once occurred, have ineradicable and disastrous effects on the development of IoT, Fog, Cloud computing. Therefore, many security systems/models have been proposed and/or implemented for the sake of Fog security. Intrusion detection systems are one of the premier choices especially ones that designed using artificial intelligence. In our paper, we presented an artificially full-automated intrusion detection system for Fog security against cyber-attacks. The proposed model uses multi-layered of recurrent neural networks designed to be implemented for Fog computing security that is very close to the end-users and IoT devices. We demonstrated our proposed model using a balanced version of the challenging dataset: NSL-KDD. The performance of our model was measured using a variety of typical metrics, and we add two additional metrics: Mathew correlation and Cohen's Kappa coefficients for deeper insight. where the experimental results and simulations proved the stability and robustness of the proposed model in terms of a variety of performance metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.