Rubia Fatima

Work place: Tsinghua University, Beijing, China

E-mail: rubiafatima91@hotmail.com

Website:

Research Interests: Computational Science and Engineering, Computational Engineering, Social Computing, Software Engineering, Computer Architecture and Organization, Social Information Systems

Biography

Rubia Fatima received her Master's degree in Information Technology (MSIT) from Bahauddin Zakariya University (B.Z.U), Multan, Pakistan. Currently, she is doing her PhD under the supervision of Prof Jianmin Wang and Associate Professor. Lin Liu at Tsinghua University, Beijing, P.R.China. Her area of interest includes empirical research and development within Software Engineering, game based learning, social engineering, cyber security, information security, serious game and requirements engineering.

Author Articles
Ontologies as Building Blocks of Cloud Security

By Naila Samad Shaikh Affan Yasin Rubia Fatima

DOI: https://doi.org/10.5815/ijitcs.2022.03.05, Pub. Date: 8 Jun. 2022

Much like other processing domains, cloud computing is not surely safe. Security of cloud processing needs the same attention as any other aspect of cloud processing requires. Cyber world is shifting toward ontological technique and web 3.0 or web semantics for security. Cloud hosts servers demand more attention in context of security as number of resources and their access increases. Security measures have to be more extensive in cloud. Semantic web is usually new revolution inside the web science, which usually works upon base of ontologies. Ontologies are receiving great attention in the domain of computing and hence in the domain of security. This review paper examines different proposed “ontology centered techniques” and also provides a comprehensive analysis on these tactics. This research paper gives critical analysis of different models presented by different authors and researchers for ensuring security of a cloud based environment. This analysis helps different vendors of cloud technology to adapt one or all of these models to practically implement in their cloud machines whether they are offering IaaS, PaaS or SaaS. Any new security model using ontologies can also be proposed based on this study, as this paper gives a comprehensive comparison of the previously proposed ontologies for monitoring security state of cloud environment as safe or malicious.

[...] Read more.
Other Articles