Please use this identifier to cite or link to this item:
http://dx.doi.org/10.25673/120999Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Ruksanan, Ruksanan | - |
| dc.contributor.author | Danggi, Erni | - |
| dc.contributor.author | Jaber, Ebaa Abdulsattar | - |
| dc.contributor.author | Imran, Arkan Adnan | - |
| dc.date.accessioned | 2025-11-04T12:18:04Z | - |
| dc.date.available | 2025-11-04T12:18:04Z | - |
| dc.date.issued | 2025-07-26 | - |
| dc.identifier.uri | https://opendata.uni-halle.de//handle/1981185920/122954 | - |
| dc.identifier.uri | http://dx.doi.org/10.25673/120999 | - |
| dc.description.abstract | Using cloud computing, businesses and individuals can store and process data more efficiently, flexibly, and cost-effectively. Despite this, with cloud systems becoming more and more integral to modern IT infrastructures, there has been a rise in concerns about data security and privacy. Traditional encryption methods may be effective if a limited amount of data is being handled but are inefficient if a large amount of data is being handled in a dynamic environment like a cloud. In this paper, advanced encryption methods are combined with data mining techniques to enhance cloud security. A novel approach to enhancing cloud security is presented in this paper, which combines advanced encryption methods with data mining. This model integrates decision tree methods with cryptographic protocols to address user authentication, data access control, and real-time detection of security threats. Further, data mining enhances cloud security by allowing detection of patterns and anomalies, enabling proactive instead of reactive security measures. A study of the potential of integrating these approaches into cloud computing systems aims to improve the privacy, security, and reliability of data. | - |
| dc.format.extent | 1 Online-Ressource (8 Seiten) | - |
| dc.language.iso | eng | - |
| dc.rights.uri | https://creativecommons.org/licenses/by-sa/4.0/ | - |
| dc.subject.ddc | DDC::6** Technik, Medizin, angewandte Wissenschaften | - |
| dc.title | A Novel Encryption and Data Mining-Based Approach to Secure Sustainable Cloud Systems | - |
| local.versionType | publishedVersion | - |
| local.publisher.universityOrInstitution | Hochschule Anhalt | - |
| local.openaccess | true | - |
| dc.identifier.ppn | 1939611997 | - |
| cbs.publication.displayform | 2025 | - |
| local.bibliographicCitation.year | 2025 | - |
| cbs.sru.importDate | 2025-11-04T12:17:06Z | - |
| local.bibliographicCitation | Enthalten in Proceedings of the 13th International Conference on Applied Innovations in IT - Koethen, Germany : Edition Hochschule Anhalt, 2025 | - |
| local.accessrights.dnb | free | - |
| Appears in Collections: | International Conference on Applied Innovations in IT (ICAIIT) | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 1-10-ICAIIT_2025_13(3).pdf | 1.05 MB | Adobe PDF | ![]() View/Open |
