Big Data Handling Approach for Unauthorized Cloud Computing Access

Autor: Abdul Razaque, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat, Aziz Alotaibi
Jazyk: angličtina
Rok vydání: 2022
Předmět:
Zdroj: Electronics, Vol 11, Iss 137, p 137 (2022)
Electronics; Volume 11; Issue 1; Pages: 137
ISSN: 2079-9292
Popis: Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
Databáze: OpenAIRE