Model of security level classification for data in hybrid cloud computing

Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data...

Full description

Saved in:
Bibliographic Details
Main Authors: Shakir M., Abubakar A., Yousoff O., Waseem M., Al-Emran M.
Other Authors: 57057236900
Format: Article
Published: Asian Research Publishing Network 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-22596
record_format dspace
spelling my.uniten.dspace-225962023-05-29T14:11:16Z Model of security level classification for data in hybrid cloud computing Shakir M. Abubakar A. Yousoff O. Waseem M. Al-Emran M. 57057236900 35178991300 57190977401 57192432529 56593108000 Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (?2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Na�ve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches. � 2005 - 2016 JATIT & LLS. All rights reserved. Final 2023-05-29T06:11:16Z 2023-05-29T06:11:16Z 2016 Article 2-s2.0-85006374982 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85006374982&partnerID=40&md5=a786299f0ff4ea8b573c509cc110952d https://irepository.uniten.edu.my/handle/123456789/22596 94 1 133 141 Asian Research Publishing Network Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (?2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Na�ve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches. � 2005 - 2016 JATIT & LLS. All rights reserved.
author2 57057236900
author_facet 57057236900
Shakir M.
Abubakar A.
Yousoff O.
Waseem M.
Al-Emran M.
format Article
author Shakir M.
Abubakar A.
Yousoff O.
Waseem M.
Al-Emran M.
spellingShingle Shakir M.
Abubakar A.
Yousoff O.
Waseem M.
Al-Emran M.
Model of security level classification for data in hybrid cloud computing
author_sort Shakir M.
title Model of security level classification for data in hybrid cloud computing
title_short Model of security level classification for data in hybrid cloud computing
title_full Model of security level classification for data in hybrid cloud computing
title_fullStr Model of security level classification for data in hybrid cloud computing
title_full_unstemmed Model of security level classification for data in hybrid cloud computing
title_sort model of security level classification for data in hybrid cloud computing
publisher Asian Research Publishing Network
publishDate 2023
_version_ 1806426608847814656
score 13.222552