Security Issues in Cloud Computing Environments and Offering a Method Based on Data Mining for Increasing Content Security

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 681

This Paper With 16 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

RSTCONF03_175

تاریخ نمایه سازی: 6 بهمن 1395

Abstract:

Cloud computing technologies reduces costs associated with computing while increasing theflexibility and scalability for computer processes. However, cloud based services have manymajor problems of information policy, including issues of privacy, security, reliability, access,and regulation, of which security is the most important one. Traditional security frameworkconsists of three essential levels – Operating systems, Services and Application level. Webservices contribute a new level in the framework and this new level is the business applicationlayer. Since the web services communicates with each other by using an XML-based messageknown as SOAP, this research focusses on the security of web application level and furtherexploits the attack ambiguous factors and then proposes a solution based-on data mining bycleaning the outlier data in order to detect the attack in the XML message. And finally, byrecognition of data distribution of a content, the changes in the XML code will be detected inorder to avoid related attacks.

Keywords:

Authors

TalinAzarian Azarian

Department of Computer Engineering ,Technical and Engineering Faculty ,Saveh Branch , Islamic Azad University, Saveh

Amir Shahab Shahabi

Department of Computer Engineering, Technical and Engineering Faculty,South Tehran Branch, Islamic Azad University, Tehran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Aziz Nasridinov, Jeong-Yong Byun, Y, ung-Ho Park.(2012). UNWRAP: An Approach ...
  • A. D. G. G. O. KarthikeyanB hargavan, CdricFourne. (2005) An ...
  • Brad Hill. (2007). A Taxonomy of Attacks against XML Digital ...
  • Dr. SrinivasP admanabhuni, Vineet Singh, K M Senthil Kumar, Abhishek ...
  • Irfans iddavatam and JayantGadge. (2008). Comprehensive Test Mechanism o Detect ...
  • M. _ Rahaman, R. Marten, and A. Schaad. (2008). An ...
  • _ A. Rahaman, A. Schaad, and M. Rits (2006). Towards ...
  • Mohammad As hiqurRahaman, Andreas Schaad.(2007). SOAP-based Secure Conversation and Collaboration ...
  • Tawfiq S. Barhoom, Raed S. K. Rasheed.(2011) Detection of XML ...
  • Weider D. (2006). Software Vulnerability Analysis for Web Services Software ...
  • MetinYaylacio glu. (2008). ...
  • نمایش کامل مراجع