Papers by Shehu Abdulwahab
The advents of Computing have led to the evolutions of large data. However, the availability of t... more The advents of Computing have led to the evolutions of large data. However, the availability of these large data can no longer be effectively stored and analyzed with traditional data management techniques. This brought about the emergence of Cloud Basedcomputing that are used to process large-scale data management tasks efficientlywith least cost. Despite this development security and privacy are issues of concern. This Study exploresa cloud based data Management security models that maintain both data and user privacyusing File Encryption/Decryption using AES algorithm and Role based access control respectively. The study adopts a Model Design and Simulation-based approach using Java API 8.2 and CloudSim 3.0 respectively to implement the security components: where Response time, latency and throughput were determined. The experiment values reached demonstrates a fast performance Role based Access control and AES File Encryption technique. General analysis shows that the modelsexhibit highly secured approach for organizations to overcome large data management and computing benefits of cloud computing. Testing the performance of the framework with more complicated data, security threats, and bandwidth/memory were recommended for further studies. Keywords: Cloud computing, role-based access control and Advanced Encryption Scheme (AES)
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), 2020
The advents of Information Technology have led to the evolutions of big data and have gained much... more The advents of Information Technology have led to the evolutions of big data and have gained much impetus in enhancing knowledge management. However, the availability of these big data can no longer be effectively stored and analyzed with traditional data management techniques to provide insights for Knowledge development. This brought about the emergence of new technologies and architectures that are required to store and analyze this big data through advanced data analytics and in turn generate vital real-time knowledge for effective decision making, innovation, efficiency and productivity for National Data Management. Hence, a unified, flexible, and scalable Cloud Based technology is used to collect, host and analytically process large-scale computing tasks efficiently and manage knowledge with minimum cost. Despite these benefits Cloud Data Management and Traffic management are issues of concern. This Study explores an intelligent cloud based computing framework that effectively analyze big data captured from different enterprise data sources and share the data to facilitate knowledge management and enhanced decision making intended for National data Management. The study adopts a Model Design and Simulation-based approach using Java API 8.2 and CloudSim 3.0 respectively. This paper contributes to both the theoretical and practice domains of Cloud Computing, Big Data Analytics and Knowledge Management that will aid in the management of National Data. Testing the performance of the framework with more complicated data and bandwidth/memory were recommended for further studies. I. INTRODUCTION The advent of Information Technology, have increase the amount of Data/Information being generated, stored and shared at an unprecedented pace [1]. The availability of this data brought about the emergence of new waves as the next frontier of innovation, competition and productivity in all facet of live. This requires a new, innovative and scalable technology to collect, host and analytically process the vast amount of data gathered in order to derive real-time insights that relate to consumers, risk, profit, performance, productivity management and enhanced shareholder value [2]. These leverage the concept of Big Data that emerges as the latest stage of the evolution that combines three trends in technology, which [3] described as the three perfect storms: computing, data and convergence. The computing storm results from the exponential growth of processing power, mobile computing, social network, and cloud computing, The data storm results from the accessibility of data with high volume, velocity and variety. The convergence storm results from the availability of open-source technology and commodity hardware [4].
Bookmarks Related papers MentionsView impact
THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE, 2020
The advents of Computing have led to the evolutions of large data. However, the availability of t... more The advents of Computing have led to the evolutions of large data. However, the availability of these large data can no
longer be effectively stored and analyzed with traditional data management techniques. This brought about the
emergence of Cloud Basedcomputing that are used to process large-scale data management tasks efficientlywith least
cost. Despite this development security and privacy are issues of concern. This Study exploresa cloud based data
Management security models that maintain both data and user privacyusing File Encryption/Decryption using AES
algorithm and Role based access control respectively. The study adopts a Model Design and Simulation-based approach
using Java API 8.2 and CloudSim 3.0 respectively to implement the security components: where Response time, latency
and throughput were determined. The experiment values reached demonstrates a fast performance Role based Access
control and AES File Encryption technique. General analysis shows that the modelsexhibit highly secured approach for
organizations to overcome large data management and computing benefits of cloud computing. Testing the
performance of the framework with more complicated data, security threats, and bandwidth/memory were
recommended for further studies.
Keywords: Cloud computing, role-based access control and Advanced Encryption Scheme (AES)
Bookmarks Related papers MentionsView impact
Global Scientific Journals, 2020
Data warehouse is central to Business Intelligence (BI) applications. It integrates different dat... more Data warehouse is central to Business Intelligence (BI) applications. It integrates different data sources usually into a unified data source. The ability to utilize existing information is critical for the success of decision making. Transaction Processing Systems address only the operational needs of an organization, they are not suitable for decision support and other business questions the managers' need to address. The objective of the paper was to propose a framework that enables retail businesses to implement data warehouse. Thus, this was achieved by using SQL Server enterprise edition. The output showed that the business can generate reports on product sales and supplier performance though the data comes from different data sources.
Bookmarks Related papers MentionsView impact
IOSR Journal of Computer Engineering, 2019
Cloud computing as a service (aaS) model is considered as one of the most ubiquitous and accompli... more Cloud computing as a service (aaS) model is considered as one of the most ubiquitous and accomplished paradigms in Information Technology (IT) in the 21 st century, it is economic, financial and technological invention in business organization that revolutionized how IT resources and services are utilized and delivered as a service framework. The introduction of cloud computing as a service (aaS) framework in cloud computing eliminate the need for organization to locally manage and maintain Information System (IS) infrastructure as well as including the cost of buying expensive hardware and software. According to the available literature reviewed in this paper, the paper has studied the evolution of as-a-service (aaS) model framework and explore the new members to as a service (aaS) model beyond the traditional cloud service that will help in proposing an approach for organization that is trying to implement, migrate and adopt cloud computing as a service.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Uploads
Papers by Shehu Abdulwahab
longer be effectively stored and analyzed with traditional data management techniques. This brought about the
emergence of Cloud Basedcomputing that are used to process large-scale data management tasks efficientlywith least
cost. Despite this development security and privacy are issues of concern. This Study exploresa cloud based data
Management security models that maintain both data and user privacyusing File Encryption/Decryption using AES
algorithm and Role based access control respectively. The study adopts a Model Design and Simulation-based approach
using Java API 8.2 and CloudSim 3.0 respectively to implement the security components: where Response time, latency
and throughput were determined. The experiment values reached demonstrates a fast performance Role based Access
control and AES File Encryption technique. General analysis shows that the modelsexhibit highly secured approach for
organizations to overcome large data management and computing benefits of cloud computing. Testing the
performance of the framework with more complicated data, security threats, and bandwidth/memory were
recommended for further studies.
Keywords: Cloud computing, role-based access control and Advanced Encryption Scheme (AES)
longer be effectively stored and analyzed with traditional data management techniques. This brought about the
emergence of Cloud Basedcomputing that are used to process large-scale data management tasks efficientlywith least
cost. Despite this development security and privacy are issues of concern. This Study exploresa cloud based data
Management security models that maintain both data and user privacyusing File Encryption/Decryption using AES
algorithm and Role based access control respectively. The study adopts a Model Design and Simulation-based approach
using Java API 8.2 and CloudSim 3.0 respectively to implement the security components: where Response time, latency
and throughput were determined. The experiment values reached demonstrates a fast performance Role based Access
control and AES File Encryption technique. General analysis shows that the modelsexhibit highly secured approach for
organizations to overcome large data management and computing benefits of cloud computing. Testing the
performance of the framework with more complicated data, security threats, and bandwidth/memory were
recommended for further studies.
Keywords: Cloud computing, role-based access control and Advanced Encryption Scheme (AES)