Model of security level classification for data in hybrid cloud computing

Mohanaad Shakir, Asmidar Abu Bakar, Ounus Yousoff, Mohammed Waseem, Mostafa Al-Emran

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (χ2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches.

Original languageEnglish
Pages (from-to)133-141
Number of pages9
JournalJournal of Theoretical and Applied Information Technology
Volume94
Issue number1
Publication statusPublished - 15 Dec 2016

Fingerprint

Cloud computing
Cloud Computing
Classifiers
Feature extraction
Support vector machines
Classifier
Feature Selection
Information Gain
Model
Chi-square
Decision trees
Usability
Support Vector Machine
Experiments
Classifier Combination
Evaluate
Bayes
Segregation
Decision tree
Experiment

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Shakir, Mohanaad ; Abu Bakar, Asmidar ; Yousoff, Ounus ; Waseem, Mohammed ; Al-Emran, Mostafa. / Model of security level classification for data in hybrid cloud computing. In: Journal of Theoretical and Applied Information Technology. 2016 ; Vol. 94, No. 1. pp. 133-141.
@article{4a9dc1504bf34a6d896e0e0805ea3ecd,
title = "Model of security level classification for data in hybrid cloud computing",
abstract = "Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (χ2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Na{\"i}ve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches.",
author = "Mohanaad Shakir and {Abu Bakar}, Asmidar and Ounus Yousoff and Mohammed Waseem and Mostafa Al-Emran",
year = "2016",
month = "12",
day = "15",
language = "English",
volume = "94",
pages = "133--141",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "1",

}

Model of security level classification for data in hybrid cloud computing. / Shakir, Mohanaad; Abu Bakar, Asmidar; Yousoff, Ounus; Waseem, Mohammed; Al-Emran, Mostafa.

In: Journal of Theoretical and Applied Information Technology, Vol. 94, No. 1, 15.12.2016, p. 133-141.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Model of security level classification for data in hybrid cloud computing

AU - Shakir, Mohanaad

AU - Abu Bakar, Asmidar

AU - Yousoff, Ounus

AU - Waseem, Mohammed

AU - Al-Emran, Mostafa

PY - 2016/12/15

Y1 - 2016/12/15

N2 - Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (χ2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches.

AB - Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (χ2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches.

UR - http://www.scopus.com/inward/record.url?scp=85006374982&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85006374982&partnerID=8YFLogxK

M3 - Article

VL - 94

SP - 133

EP - 141

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 1

ER -