Model of security level classification for data in hybrid cloud computing

Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data...

সম্পূর্ণ বিবরণ

গ্রন্থ-পঞ্জীর বিবরন
প্রধান লেখক: Shakir, Mohanaad, Asmidar, Abubakar, Yousoff, Younus, Waseem, Mohammed, Al-Emran, Mostafa
বিন্যাস: প্রবন্ধ
ভাষা:English
প্রকাশিত: JATIT 2016
বিষয়গুলি:
অনলাইন ব্যবহার করুন:http://umpir.ump.edu.my/id/eprint/29213/1/Model%20of%20security%20level%20classification%20for%20data%20in%20hybrid.pdf
_version_ 1825813484516933632
author Shakir, Mohanaad
Asmidar, Abubakar
Yousoff, Younus
Waseem, Mohammed
Al-Emran, Mostafa
author_facet Shakir, Mohanaad
Asmidar, Abubakar
Yousoff, Younus
Waseem, Mohammed
Al-Emran, Mostafa
author_sort Shakir, Mohanaad
collection UMP
description Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (χ2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches.
first_indexed 2024-03-06T12:44:42Z
format Article
id UMPir29213
institution Universiti Malaysia Pahang
language English
last_indexed 2024-03-06T12:44:42Z
publishDate 2016
publisher JATIT
record_format dspace
spelling UMPir292132022-11-07T08:16:42Z http://umpir.ump.edu.my/id/eprint/29213/ Model of security level classification for data in hybrid cloud computing Shakir, Mohanaad Asmidar, Abubakar Yousoff, Younus Waseem, Mohammed Al-Emran, Mostafa QA76 Computer software Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (χ2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches. JATIT 2016-12-15 Article PeerReviewed pdf en cc_by_nc_nd_4 http://umpir.ump.edu.my/id/eprint/29213/1/Model%20of%20security%20level%20classification%20for%20data%20in%20hybrid.pdf Shakir, Mohanaad and Asmidar, Abubakar and Yousoff, Younus and Waseem, Mohammed and Al-Emran, Mostafa (2016) Model of security level classification for data in hybrid cloud computing. Journal of Theoretical and Applied Information Technology, 94 (1). pp. 133-141. ISSN 1992-8645 (print); 817-3195 (online). (Published) http://www.jatit.org/volumes/Vol94No1/13Vol94No1.pdf
spellingShingle QA76 Computer software
Shakir, Mohanaad
Asmidar, Abubakar
Yousoff, Younus
Waseem, Mohammed
Al-Emran, Mostafa
Model of security level classification for data in hybrid cloud computing
title Model of security level classification for data in hybrid cloud computing
title_full Model of security level classification for data in hybrid cloud computing
title_fullStr Model of security level classification for data in hybrid cloud computing
title_full_unstemmed Model of security level classification for data in hybrid cloud computing
title_short Model of security level classification for data in hybrid cloud computing
title_sort model of security level classification for data in hybrid cloud computing
topic QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/29213/1/Model%20of%20security%20level%20classification%20for%20data%20in%20hybrid.pdf
work_keys_str_mv AT shakirmohanaad modelofsecuritylevelclassificationfordatainhybridcloudcomputing
AT asmidarabubakar modelofsecuritylevelclassificationfordatainhybridcloudcomputing
AT yousoffyounus modelofsecuritylevelclassificationfordatainhybridcloudcomputing
AT waseemmohammed modelofsecuritylevelclassificationfordatainhybridcloudcomputing
AT alemranmostafa modelofsecuritylevelclassificationfordatainhybridcloudcomputing