Naila Samad Shaikh

Work place: Bahauddin Zakariya University Multan Pakistan

E-mail: nailasheikh1@gmail.com

Website:

Research Interests: Autonomic Computing, Information Security, Network Security, Computing Platform, World Wide Web, Mathematics of Computing

Biography

Ms. Naila Samad Shaikh is a Lecturer and Head of Computer Science Department at Govt. Degree College for Women, Bosan Road Multan, Pakistan. She has a Masters in Science degree in “Information Technology” from “Bahauddin Zakariya University, Multan”, Pakistan. She received her “Master of Information Technology” MIT and Bachelor of Science in Mathematics and Statistics from “Bahauddin Zakariya University Multan”, Pakistan. Her research interest includes Cloud Computing, cloud security, Web semantics, cyber security and Internet security.

Author Articles
Ontologies as Building Blocks of Cloud Security

By Naila Samad Shaikh Affan Yasin Rubia Fatima

DOI: https://doi.org/10.5815/ijitcs.2022.03.05, Pub. Date: 8 Jun. 2022

Much like other processing domains, cloud computing is not surely safe. Security of cloud processing needs the same attention as any other aspect of cloud processing requires. Cyber world is shifting toward ontological technique and web 3.0 or web semantics for security. Cloud hosts servers demand more attention in context of security as number of resources and their access increases. Security measures have to be more extensive in cloud. Semantic web is usually new revolution inside the web science, which usually works upon base of ontologies. Ontologies are receiving great attention in the domain of computing and hence in the domain of security. This review paper examines different proposed “ontology centered techniques” and also provides a comprehensive analysis on these tactics. This research paper gives critical analysis of different models presented by different authors and researchers for ensuring security of a cloud based environment. This analysis helps different vendors of cloud technology to adapt one or all of these models to practically implement in their cloud machines whether they are offering IaaS, PaaS or SaaS. Any new security model using ontologies can also be proposed based on this study, as this paper gives a comprehensive comparison of the previously proposed ontologies for monitoring security state of cloud environment as safe or malicious.

[...] Read more.
Other Articles