PredictingCriticalCloudComputingSecurityIssuesusingArtificialNeuralNetworkANNsAlgorithmsinBankingOrganizations.pdf

    ©2012-17 International Journal of Information Technology and Electrical Engineering `

    ITEE, 6 (2) pp. 40-45, APR 2017

    40

    ITEE Journal Information Technology & Electrical Engineering

    ISSN: – 2306-708X

    Volume 6, Issue 2 April 2017

    Predicting Critical Cloud Computing Security Issues using Artificial Neural

    Network (ANNs) Algorithms in Banking Organizations

    Abdelrafe Elzamly1, Burairah Hussin 2, Samy S. Abu Naser3, Tadahiro Shibutani4, and Mohamed Doheir5

    1Department of Computer Science, Al-Aqsa University, Gaza, Palestine 2 ,5 Information & Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia

    3Department Information Technology, Al-Azhar University, Gaza, Palestine 4Institute of Advanced Sciences, Yokohama National University, Yokohama, Japan

    E-mail: [email protected]

    ABSTRACT The aim of this study is to predict critical cloud computing security issues by using Artificial Neural Network (ANNs) algorithms.

    However, we proposed the Levenberg–Marquardt based Back Propagation (LMBP) Algorithms to predict the performance for

    cloud security level. Also LMBP algorithms can be used to estimate the performance of accuracy in predicting cloud security

    level. ANNs are more efficiently used for improving performance and learning neural membership functions. Furthermore, we

    used the cloud Delphi technique for data gathering and analysis it in this study. In this study, the samples of 40 panelists were

    selected from inside and outside Malaysian banking organizations based on their experienced in banking cloud computing.

    However, we have indicated that the LMBP is nonlinear optimization models which used to measure accuracy of the prediction

    model, the Mean Square Error (MSE) are measured to determine the performance. The performance is goodness, if the MSE is

    small as shown in Table 1. This work has been conducted on groups of cloud banking developers and IT managers. As future

    work, we intend to combine another optimal technique with ANNs algorithms to predict and mitigate critical security cloud issues.

    Though, positive prediction of critical cloud security issues is going to surge the probability of cloud banking success rate.

    Keywords: Cloud banking organization, Cloud Computing, Cloud Security Issues, , Artificial Neural Network, Levenberg Marquardt Algorithm,

    Back Propagation Algorithm,. 1. NTRODUCTION

    Although much research and progress in the area of

    cloud computing project, a lot of cloud computing projects

    have a very high failure rate particularly when it is related to

    the banking area. However, several serious cloud security

    issues like data protection and integrity, quality of

    services(QoS), Portability and Interoperability, and mobility

    need to be controlled and mitigated before cloud computing

    able to apply adoptive widely [1]. In addition, cloud

    computing has several advantages but cloud computing in

    banking organizations is suffering from a lot of cloud

    security issues. The aim of cloud risk management is

    identification and evaluation of cloud security issues at an

    early stage to predict the cloud computing security level [2].

    Today, cloud computing risk management became a mutual

    practice amongst leading banking organization success. In

    the increasing effort to improve development processes and

    security; new studies have led to cloud computing risk area.

    Risk management aids software project manager and team

    to do improved decisions to mitigate cloud-computing risks.

    The objective of this study is predicting performance for

    cloud computing security issues using Levenberg–

    Marquardt based Back Propagation (LMBP) algorithms.

    2. LITERATURE REVIEW

    Cloud computing risk management consists of

    computing processes, methods and techniques that are

    useful to mitigate cloud computing risk failure. Security

    risk management is increasingly becoming significant

    in a diversity of areas linked to information technology

    (IT), for example: telecommunications, banking

    information systems, cloud computing[3]. Moreover,

    the cloud banking model is a resource management

    modeling founded on economic philosophies. Its

    function like commercial banks in loan and deposit

    business [4]. Cloud security is a general subject and any

    grouping of policies, controls, and technologies to

    safeguard data, services and infrastructure from

    conceivable attacks. Additionally, current researches

    focused on providing security technologies, instead of

    business features such as services stability, availability

    and continuity [5]. This study is going to predict the

    critical cloud issues in Malaysian banking

    organizations. Actually, they presented the conceptual

    framework for cloud security banking that involved

    components for example security, legal, privacy,

    compliance and regulatory issues of banking [6]. As

    stated by previous studies we split the framework

    modeling cloud computing to five phases as mobility

    and banking application, Cloud Deployment Models

    (CDM), cloud risk management models (CRMM),

    Cloud Service Models (CSM), and cloud security model

    (CSM) as follows: Firstly, mobility related to the

    possibility of moving and taking place in diverse

    locations and through multiple times using any kind of

    portable devices like smart phones, Personal Digital

    Assistants (PDAs) and wireless laptops. Nonetheless,

    mobile banking related to any operation that linked to

    banking services like balance check, payments and

    receiving banking SMS via a mobile device, and

    account transactions [7]. Secondly, CSM depend on

    ©2012-17 International Journal of Information Technology and Electrical Engineering `

    ITEE, 6 (2) pp. 40-45, APR 2017

    41

    ITEE Journal Information Technology & Electrical Engineering

    ISSN: – 2306-708X

    Volume 6, Issue 2 April 2017

    some state of the art of web technologies like

    Application Programming Interface (API), Web

    Services, Web 2.0, and etc. [8]. Also, CSM is split into

    four categories that are offered from a cloud provider:

    Software as a Service (SaaS), Platform as a Service

    (PaaS), Banking Process as a Service (BPaaS), and

    Infrastructure as a Service (IaaS). Thirdly, CDM can be

    split into four dissimilar types: Public cloud is made

    obtainable to the general public or a huge industry group

    and are possessed by a third party selling cloud services

    [9]. Private Cloud is functioned and possessed by a

    single organization or company that focuses on

    controlling the mechanism of virtualizing resources and

    automating services those are used and tailored by many

    lines of business and essential groups [4]. Community

    cloud falls among public and private clouds with regard

    to the target set of consumers [10]. Community cloud,

    this model is used by a specific group of community

    within an organization that has the same worry,

    objectives or security necessities [11]. Hybrid cloud

    uses both public and private cloud methods, where it

    smears the strategic notions of the services of public

    cloud with the basis of the private cloud. Fourthly,

    Cloud Risk Management (CRM): in Cloud computing,

    risk required to be taken into consideration in all phases

    of interactions and investigated at every service stage in

    relation to the possessions that should be protected [12].

    Besides, there are diverse types of risks that bank

    management should be protected against. For numerous

    banks, the main risk is credit risk but there are several

    other risks that supervising authorities must notify

    banks about connected criteria and require them to

    follow [13]. There are eight phases for effective cloud

    risk management like Cloud Risk Planning Phase

    (CRPL), Cloud Risk Analysis (CRA) phase, Cloud Risk

    Identification(CRI) phase, Cloud Risk

    Prioritization(CRP) phase, Cloud Risk

    Evaluation(CRE) phase, Cloud Risk Treatment(CRT)

    phase includes four strategies for responding to cloud

    risks: cloud risk mitigation, cloud risk avoidance, cloud

    risk transfer, cloud risk elimination, cloud risk

    acceptance, Cloud Risk Controlling(CRC) phase, and

    Cloud Risk Communication & Documentation (CRCD)

    phase. Finally, Cloud Security Issues Models (CSIM):

    cloud security is a very common topic and any grouping

    of policies, technologies, and controls to protect data,

    infrastructure and services from possible attacks or

    achieving business objectives all the security domains

    should work in an effective manner [14].

    3. CLOUD SECURITY ISSUES

    Though, classification of critical security issues in

    cloud banking is needed to be highlighted in this section

    [15]: 3rd Party (Providers) and Policies Security Issues:

    Lack of standards, Service Level Agreement (SLAs),

    Governance, Legally and policy, Dependency, Lack of

    transparency, Cloud service provider viability,

    Malicious insiders, Regulatory compliance &

    requirements, Shared technology issues, Unknown risk

    profile, Trusted cloud, Abuse cloud computing;

    Application and program (software) security issues:

    Authentication, Authorization, Insecure Interfaces

    API’s, Availability and Mobility, Portability and

    Interoperability; Data and Information Security Issues:

    Privacy, Confidentiality, Data Protection, Data

    Limitations and Segregation, Data integrity and

    scavenging, Data Location, Data Loss/Leakage,

    Detection and Recovery, Hijacking of Account or

    Service & Traffic; Security Control & Network Issues:

    Information flow Controlling, Intrinsic Constrains of

    Wireless Network, Network Access Schemes,

    Bandwidth, Anonymity and Network Traffic Analysis,

    Network Security, Virtual Network Protection, Limited

    control, Distributed Denial of Service (DDoS),

    Heterogeneity in Mobile cloud Devices, Platform

    Reliability and Latency; Security and Service

    Management Issues: Session Management,

    Identity/Access Management, Quality of Service (QoS),

    IT organizational changes; Physical Infrastructure

    Security Issues: Flexibility Infrastructure, Single Point

    to Attack and Failure, High-value cyber-attack targets,

    the multi-tenancy, Scalability, Cost.

    4. EMPIRICAL STRATEGY

    The Delphi technique use to collect data as

    qualified informants, so we focused on two cloud

    developers groups and cloud IT managers in banking

    organizations. In this regard the Delphi study is

    modified to three phases like identifying, analyzing, and

    evaluating as described in Figure 1. The data are

    collected by secondary data and Delphi study. In current

    study, the population samples of forty panelists were

    chosen from inside and outside Malaysian banking

    organizations according to their experienced in cloud

    banking. Actually, we measure the probability of

    occurrence according to a 10 scales (1= “very low

    probability of occurrence risk” and 10 = “very high

    probability of occurrence risk”), and the brutality of the

    cloud security issues described on a 10 scales (1= “very

    low influence risk” and 10 = “very high impact risk”.

    Actually, we used Delphi techniques for data gathering

    and analysis it in this study. However, we will begin a

    list of cloud security issues based on secondary data,

    experienced of cloud managers and cloud developers.

    The Delphi method is collected data and aggregated of

    cloud security issues. In fact, we divided the phases of

    cloud Delphi technique into three phases such as

    identifying, analyzing, and evaluating. However, we

    illustrate the concept of Delphi technique for identifying

    and classifying cloud security issues in Figure 1 as

    follows:

    Cloud Delphi Technique

    Phase 1: Identifying  Collected data and aggregated of cloud

    security issues.

     Select the experts from both inside and outside

    the banking organization.

     Divide panelist to two groups cloud

    ©2012-17 International Journal of Information Technology and Electrical Engineering `

    ITEE, 6 (2) pp. 40-45, APR 2017

    42

    ITEE Journal Information Technology & Electrical Engineering

    ISSN: – 2306-708X

    Volume 6, Issue 2 April 2017

    Figure 1: Illustrates the steps of cloud Delphi study of

    collecting data [16]

    5. METHODOLOGY (MATERIALS &

    METHODS)

    However, the data gathered for this study to be used

    in the modelling is getting from the managers and cloud

    developers in banking organizations. We propose

    Artificial Neural Network (ANNs) for predicting cloud

    security issues in banking organizations. In order to

    manage and predict performance of cloud computing

    security level, we can use artificial neural networks

    methods. In order to establish the intelligent approaches,

    first we need to model the relationship between cloud

    computing issues. In addition, artificial neural networks

    modelling are used as nonlinear statistical data model to

    predict cloud-computing issues. Of course, IT managers

    and cloud developers must use practical approaches,

    methods, and tools to predict cloud security issues in

    banking organization. Indeed, the back-propagation

    algorithm is used in layered feed- forward ANNs where

    the artificial neurons are structured in layers, and lead

    their signals “forward”, and then the errors are

    transmitted backwards. The neural network gets input

    from input layers and yields the output to the output

    layer and the processing can be done in hidden layers.

    There must be only one input and output layer, however,

    there may be an arbitrary number of hidden layers [17-

    19]. Additionally, the BP algorithm should minimize

    these errors, till the ANN learns the training data.

    Typically the training initiates with random weights,

    and the learning objective is to modify them so that the

    error is reduced [17-19]. The design of procedures for

    predicting cloud security issues using Levenberg-

    Marquardt (LM) Based Back Propagation (BP)

    Algorithm as follows:

    1. Collect and prepare the data for cloud security issues based on Cloud Delphi Technique.

    2. Assign an estimated probability of occurrence and severity of cloud security issues based on

    security models.

    3. Build a network analysis 4. Train the network: It generates the neural

    network from a Cloud Delphi dataset with

    known output data cases.

    5. Test the network: A trained neural networks are used to test how well it does at prediction of

    known and new output values.

    6. Predict cloud security issues based models by using artificial neural networks for evaluating

    the performance impact of CSI. A trained neural

    network is used to predict unknown output

    value.

    6. RESULTS AND DISCUSSION

    Indeed, we used the Levenberg–Marquardt based

    Back Propagation (LMBP) Algorithms, as nonlinear

    optimization to predict the performance. So we illustrate

    the mean square error and Regression (R) values for the

    Training, Validation and Testing as in Table 1.

    Table 1 Illustrates the MSE and Regression values for the

    three types Types Samples Training

    data

    (input)%

    MSE R

    Training 28 70% 4.94160×e-7 9.95213×e-1

    Validation 6 15% 8.75807×e-6 9.79262×e-1

    Testing 6 15% 1.95378×e-5 9.49600×e-1

    Table 1 shows that the overall Mean Square Error

    which measure the average squared errors between the

    output data and targets data and Regression (R) which

    measure correlation between the actual outputs data and

    targets data for training, validation and testing samples.

    The accuracy of prediction is observed, when the values of

    R are closest to 1. Hence, if the dataset was trained by using

    (LMBP) Algorithms, the performance obtained was in 3 epochs with 10 hidden neurons yields. The results indicated

    that the LMBP algorithms are very efficiently for testing and

    training networks. Although, a two-layered feed forward

    network hidden neurons and networks are trained using

    LMBP Algorithms as shown in Figure 2.

    ©2012-17 International Journal of Information Technology and Electrical Engineering `

    ITEE, 6 (2) pp. 40-45, APR 2017

    43

    ITEE Journal Information Technology & Electrical Engineering

    ISSN: – 2306-708X

    Volume 6, Issue 2 April 2017

    Figure 2 architecture and algorithms and progress of ANN

    system

    Figure 3 Performance of LMBP Algorithm (MSE vs.

    Epochs)

    Figure 4 error histogram with 20 bins based LMBP

    Indeed, it is trained to measure the performance of networks

    by using LMBP algorithms in Matlab R2013b.

    Furthermore, we estimated the best validation performance

    0.0000087581 at epoch 3 in Figure 3 and the error histogram

    with 20 bins is illustrated in Figure 4. Therefore, regression

    R values are measured the correlation between outputs and

    targets. Hence, the results in the regression analysis plot are

    perfect correlation between the outputs and targets as in

    Figure 5. In addition, the one mean a close relation between

    outputs and targets, zero a random relationship. LMBP is

    nonlinear optimal models which used to measure accuracy

    of the prediction model, the Mean Square Error (MSE) are

    measured to determine the performance. The performance is

    goodness, if the MSE is small.

    Figure 5 Regression Analysis Plot – Levenber g-Marquardt

    Backpropagation Algorithm

    7. CONCLUSIONS

    The concern of the study is to predict critical cloud

    computing security issues using Artificial Neural

    Network (ANNs) algorithms. However, we presented

    the Levenberg–Marquardt based Back Propagation

    (BP) Algorithms to predict the performance for cloud

    security level. Also LMBP algorithm is applied to

    0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5

    10-10

    10-5

    Best Validation Performance is 8.7581e-06 at epoch 3

    Me

    an

    Sq

    ua

    re

    d E

    rro

    r (m

    se

    )

    5 Epochs

    Train

    Validation

    Test

    Best

    0

    2

    4

    6

    8

    10

    12

    Error Histogram with 20 Bins

    Ins

    tan

    ce

    s

    Errors = Targets – Outputs

    -0.0

    049

    -0.0

    0418

    -0.0

    0345

    -0.0

    0272

    -0.0

    02

    -0.0

    0127

    -0.0

    0055

    0.0

    00181

    0.0

    00907

    0.0

    01632

    0.0

    02358

    0.0

    03084

    0.0

    0381

    0.0

    04536

    0.0

    05262

    0.0

    05988

    0.0

    06714

    0.0

    0744

    0.0

    08166

    0.0

    08892

    Training

    Validation

    Test

    Zero Error

    0.65 0.66 0.67 0.68 0.690.65

    0.655

    0.66

    0.665

    0.67

    0.675

    0.68

    0.685

    0.69

    Target

    Ou

    tpu

    t ~

    = 0

    .97

    *T

    arg

    et

    + 0

    .02

    Training: R=0.99521

    Data

    Fit

    Y = T

    0.65 0.66 0.67 0.68 0.690.65

    0.655

    0.66

    0.665

    0.67

    0.675

    0.68

    0.685

    0.69

    Target

    Ou

    tpu

    t ~

    = 1

    .2*T

    arg

    et

    + –

    0.1

    4

    Validation: R=0.97926

    Data

    Fit

    Y = T

    0.65 0.66 0.67 0.68 0.690.65

    0.655

    0.66

    0.665

    0.67

    0.675

    0.68

    0.685

    0.69

    Target

    Ou

    tpu

    t ~

    = 1

    .3*T

    arg

    et

    + –

    0.2

    3

    Test: R=0.9496

    Data

    Fit

    Y = T

    0.65 0.66 0.67 0.68 0.690.65

    0.655

    0.66

    0.665

    0.67

    0.675

    0.68

    0.685

    0.69

    Target

    Ou

    tpu

    t ~

    = 1

    .1*T

    arg

    et

    + –

    0.0

    41

    All: R=0.9596

    Data

    Fit

    Y = T

    ©2012-17 International Journal of Information Technology and Electrical Engineering `

    ITEE, 6 (2) pp. 40-45, APR 2017

    44

    ITEE Journal Information Technology & Electrical Engineering

    ISSN: – 2306-708X

    Volume 6, Issue 2 April 2017

    estimate and test the performance of accuracy for

    predicting cloud security level. ANNs are more

    efficiently used for improving performance and learning

    neural membership functions. Indeed, the performance

    of cloud security is analyzed by using LMBP to give the

    best performance in the predicting models.

    Furthermore, we used the cloud Delphi technique for

    data gathering and analyzing it in this study. In this

    study, the samples of 40 panelists were selected from

    inside and outside Malaysian banking organizations based on their experienced in banking cloud computing.

    However, we have indicated that the LMBP is nonlinear

    optimal models which used to measure accuracy of the

    prediction model and to reduce the error between the

    actual outputs and targets for training process, the Mean

    Square Error(MSE) are measured to determine the

    performance. The performance is goodness, if the MSE

    is small as shown in Table 1. As future work, we intend to use another optimal technique with Artificial Neural

    Network algorithms to predict and mitigate critical

    security cloud issues.

    8. Acknowledgements

    This work is organized by the Welfare Association in

    Palestine; financially supported by the Arab Monetary

    Fund, and Bank of Palestine under the program name

    (Academic Fellowship Program Zamalah). The authors

    also would like to thank Al-Aqsa University, Gaza,

    Palestine and Faculty of Information & Communication

    Technology, Universiti Teknikal Malaysia Melaka

    (UTeM), Malaysia.

    References

    [1] D. Hoang and L. Chen, “Mobile Cloud for Assistive

    Healthcare (MoCAsH),” in 2010 IEEE Asia-Pacific

    Services Computing Conference Mobile, (2010), pp.

    325–332.

    [2] J. Miler and J. Górski, “Supporting Team Risk

    Management in Software Procurement and

    Development Projects,” in 4th National Conference

    on Software Engineering, (2002), pp. 1–15.

    [3] J. Mounzer, T. Alpcan, and N. Bambos, “Integrated

    Security Risk Management for IT-Intensive

    Organizations,” in 2010 Sixth International

    Conference on Information Assurance and Security,

    (2010), pp. 329–334.

    [4] H. Li, Y. Pu, and J. Lu, “A Cloud Computing

    Resource Pricing Strategy Research-based on

    Resource Swarm Algorithm,” in 2012 International

    Conference on Computer Science and Service

    System, (2012), pp. 2217–2222.

    [5] Z. Gao, Y. Li, H. Tang, and Z. Zhu, “Management

    Process Based Cloud Service,” in International

    Conference on Cyberspace Technology (CCT 2013),

    (2013), pp. 278–281.

    [6] M. Alemu and A. Omer, “Cloud Computing

    Conceptual Security Framework for Banking

    Industry,” J. Emerg. Trends Comput. Inf. Sci., vol.

    5, no. 12, pp. 921–930, (2014).

    [7] A. Alzahrani, N. Alalwan, and M. Sarrab, “Mobile

    Cloud Computing: Advantage, Disadvantage and

    Open Challenge,” in Proceedings of the 7th Euro

    American Conference on Telematics and

    Information Systems, (2014), pp. 4–7.

    [8] E. Aruna, A. Shri, and A. Lakkshmanan, “Security

    Concerns and Risk at Different Levels in Cloud

    Computing,” in 2013 International Conference on

    Green Computing, Communication and

    Conservation of Energy (ICGCE), (2013), pp. 743–

    746.

    [9] K. Beckers, J.-C. Kuster, H. Schmidt, and S.

    Faßbender, “Pattern-Based Support for Context

    Establishment and Asset Identification of the ISO

    27000 in the Field of Cloud Computing,” in 2011

    Sixth International Conference on Availability,

    Reliability and Security Pattern-Based, (2011), pp.

    327–333.

    [10] S. Goyal, “Public vs Private vs Hybrid vs

    Community-Cloud Computing: A Critical Review,”

    International Journal of Computer Network and

    Information Security, vol. 6, no. 3. pp. 20–29,

    (2014).

    [11] A. Khrisna and Harlili, “Risk Management

    Framework with COBIT 5 and Risk Management

    Framework for Cloud Computing Integration,” in

    2014 International Conference of Advanced

    Informatics: Concept, Theory and Application

    (ICAICTA) Risk, (2014), pp. 103–108.

    [12] M. Kiran, M. Jiang, D. Armstrong, and K. Djemame,

    “Towards a Service Lifecycle based Methodology

    for Risk Assessment in Cloud Computing,” in 2011

    Ninth IEEE International Conference on

    Dependable, Autonomic and Secure Computing,

    (2011), pp. 450–457.

    [13] M. Ahmadalinejad and S. Hashemi, “A National

    Model to Supervise on Virtual Banking Systems

    through the Bank 2 . 0 Approach,” ACSIJ Adv.

    Comput. Sci. an Int. J., vol. 4, no. 1, pp. 83–93,

    (2015).

    [14] F. Al-anzi, S. Yadav, and J. Soni, “Cloud

    Computing: Security Model Comprising

    Governance, Risk Management and Compliance,”

    in 2014 International Conference on Data Mining

    and Intelligent Computing (ICDMIC), (2014), pp.

    1–6.

    [15] A. Elzamly, B. Hussin, S. A. Naser, K. Khanfar, M.

    Doheir, A. Selamat, and A. Rashed, “A New

    Conceptual Framework Modelling for Cloud

    Computing Risk Management in Banking

    Organizations,” Int. J. Grid Distrib. Comput., vol. 9,

    no. 9, pp. 137–154, (2016).

    [16] A. Elzamly, B. Hussin, and B. ASH, “Classification

    of Critical Cloud Computing Security Issues for

    Banking Organizations: A Cloud Delphi Study,” Int.

    J. Grid Distrib. Comput., vol. 9, no. 8, pp. 137–158,

    (2016).

    ©2012-17 International Journal of Information Technology and Electrical Engineering `

    ITEE, 6 (2) pp. 40-45, APR 2017

    45

    ITEE Journal Information Technology & Electrical Engineering

    ISSN: – 2306-708X

    Volume 6, Issue 2 April 2017

    [17] B. Ibrahim and A. Shanavas, “An Approach to

    Predict SOA Security Vulnerabilities using Feed

    Forward Artificial Neural Networks,” SIJ Trans.

    Comput. Networks Commun. Eng., vol. 3, no. 4, pp.

    54–58, (2015)

    [18] S. Abu Naser, "Predicting learners performance

    using artificial neural networks in linear

    programming intelligent tutoring system."

    International Journal of Artificial Intelligence &

    Applications vol. 3, no. 2, pp.65-73, (2012) .

    [19] S. Abu Naser, et al. "Predicting Student Performance

    Using Artificial Neural Network: in the Faculty of

    Engineering and Information Technology."

    International Journal of Hybrid Information

    Technology, vol. 8 no. 2, 221-228,(2015)

    Authors’ information

    Abdelrafe Elzamly, He got a Ph.D.

    in Information and Communication

    Technology from the Technical

    University Malaysia Melaka (UTeM)

    in 2016 with a record of about 20

    publications. He received his Master

    degree in Computer Information

    Systems from the University of Banking and Financial

    Sciences in 2006. He received his B.Sc. degree in Computer

    from Al-Aqsa University, Gaza in 1999. He is currently

    working as Assistant Professor in Al-Aqsa University as a

    full time. Also, from 1999 to 2007 he worked as a part time

    lecturer at the Islamic University in Gaza. Between 2010 and

    2012 he worked as a Manager in the Mustafa Center for

    Studies and Scientific Research in Gaza. His research

    interests are in risk management, software and information

    systems engineering, cloud computing security, and data

    mining.

    Burairah Hussin, He received his

    Ph.D. degree in Management

    Science-Condition Monitoring

    Modelling, from the University of

    Salford, UK in 2007. Before that, he

    received a M.Sc. degree in

    Numerical Analysis and

    Programming from the University of Dundee, UK in 1998

    and a B.Sc. degree in Computer Science from the University

    of Technology Malaysia in 1996. He currently works as a

    Professor at the Technical University Malaysia Melaka

    (UTeM). He also worked as the Dean at the Faculty of

    Information and Communication Technology, Technical

    University of Malaysia Melaka (UTeM). His research

    interests are in data analysis, data mining, maintenance

    modelling, artificial intelligence, risk management,

    numerical analysis, and computer network advising and

    development.

    Samy Abu Naser, He got a Ph.D. in

    Computer Science from North

    Dakota State University, USA in

    1993. He received his M.Sc. Degree

    in Computer Science from Western

    Kentucky University, USA in 1989.

    He received his B.Sc. Degree in

    Computer Science from Western

    Kentucky University, USA in 1987. He is currently working

    as a professor in Al-Azhar University, he worked as the

    Dean of the Faculty of Engineering and Information

    Technology in AL-Azhar University, he worked as Deputy

    Vice President for Planning & Quality Assurance, and he

    worked as a deputy dean of the Faculty of Engineering and

    Information Technology in Al- Azhar University. His

    research interests are in data mining, artificial intelligent,

    and risk management.

    Tadahiro Shibutani, He received

    the Ph.D. degree in mechanical

    engineering from Kyoto

    University, Kyoto, Japan, in 2000.

    He was a Visiting Scholar with the

    Center of Advanced Life Cycle

    Engineering, University of

    Maryland, in 2007. He is currently Associate Professor of

    Center for Creation of Symbiosis Society with Risk with

    Yokohama National University, Yokohama, Japan. His

    research interests include physics of failure, health

    monitoring, and risk management for engineering systems.

    Mohamed Doheir, He is currently a

    PhD candidate in Health Care

    Management in University Technical

    Malaysia Malaka (UTeM). He

    received his M. Sc. degree in Internet

    working Technology from University

    Technical Malaysia Malaka (UTeM) in

    2012. He received his B.Sc. Degree in Educational

    Computer Science from Al Aqsa University- Gaza, Palestine

    in 2006. His research interests are in Health care, Cloud

    Computing and Network Simulation.

                                                                                                                                      Order Now