مجال
التميز
|
تميز دراسي و بحثي
|
|
|
البحوث المنشورة
|
|
البحث (1):
|
|
عنوان البحث:
|
Investigating the Security Factors in Cloud
Computing Adoption: Towards Developing an Integrated Framework
|
رابط إلى البحث:
|
Click
here
|
تاريخ النشر:
|
June 2016
|
موجز عن البحث:
|
There are several benefits of using cloud computing
in organizations and government agencies such as cost saving and flexibility
in getting resources. Cloud computing plays a significant changing in
organizations since it allows the users to access the service anytime and
everywhere via networks, with paying for using only. In developing countries,
such as Saudi Arabia, the cloud computing is still in its early time not
widely adopted, compared to countries in the west. In order to promote the
adoption of cloud computing, it is important to recognize an important and
specific issue related to cloud computing is the potential and perceived
security factors that posed by implementing the technology. Hence, the aim of
this study is to investigate the security factors that influence organization
and government agencies to adopt cloud computing in a Saudi Arabia context.
This paper proposed a framework identifies the key factors for the successful
adoption of cloud computing, focused on risks, social and security benefits
when implementing security in the cloud services. The proposed framework is
involving of three categories, social factors category, cloud security risks
category and perceived cloud security benefits. The finding showed that all
the proposed factors in the framework were statistically significant, except
one factors under perceived cloud security benefits were not statically
significant.
|
البحث (2):
|
|
عنوان البحث:
|
An
exploratory study for investigating the critical success factors for cloud
migration in the Saudi Arabian higher education context
|
رابط إلى البحث:
|
Click
here
|
تاريخ النشر:
|
26/10/2016
|
موجز عن البحث:
|
Saudi universities have at their
disposal a huge number of low cost IT resources to aid in teaching, research
and learning. By migrating to cloud services, Saudi universities will be
moving data and programs from local servers to the internet, thereby
providing users with the ability to access and share information at any time
from multiple devices. The migration to cloud-based IT resources is not yet
widespread in Saudi universities due to several challenges including
security, legal policies and implementation. At present, there is lack of
research and guidance for Saudi universities on how to overcome these
challenges and how contextual factors can influence the successful migration
to the educational clouds.
This research presents a framework for
the successful migration to cloud technology in the Saudi Arabian
universities. In this research, a set of key critical success factors (CSFs)
were identified by synthesizing components from studies concerned with the
migration of cloud for higher education and factors identified from the
successful implementation of WBL (Web Based Learning) and ERP (Enterprise
Resource Planning) on higher education in Saudi Arabia. Based on this
knowledge, the proposed framework was evaluated via expert review and a
survey by IT specialists from the Saudi universities. The initial CSFs were
updated based on the expert reviews and the results were analysed. Based on
the findings at this stage, additional CSFs were added to the framework as
suggested by the experts. Subsequently, in order to confirm the reviewed
CSFs, additional investigation via a structured online questionnaire was
conducted and the outcome was analysed via one-sample t-test with
the data integrity analysed via Cronbach’s alpha. The outcome indicated the
majority of CSFs to be statistically significant except the Physical Location
CSF. Potential future study and contributions are discussed.
|
|
|
البحث (3):
|
|
عنوان البحث:
|
Inverse
Matrix using Gauss Elimination Method by OpenMP
|
رابط إلى البحث:
|
Click
here
|
تاريخ النشر:
|
February, 2016
|
موجز عن البحث:
|
—OpenMP is an implementation program
interface that might be utilized to explicitly immediate multi-threaded and
it shared memory parallelism. OpenMP platform for specifications
multi-processing via concurrent work between interested parties of hardware and
software industry, governments and academia. OpenMP is not needs implemented
identically by all vendors and it is not proposed for distributed memory
parallel systems by itself. In order to invert a matrix, there are multiple
approaches. The proposed LU decomposition calculates the upper and lower
triangular via Gauss elimination method. The computation can be parallelized
using OpenMP technology. The proposed technique main goal is to analyze the
amount of time taken for different sizes of matrices so we used 1 thread, 2
threads, 4 threads, and 8 threads which will be compared against each other
to measure the efficiency of the parallelization. The result of interrupting
compered the amount of time spent in all the computing using 1 thread, 2
threads, 4 threads, and 8 threads. We came up with if we raise the number of
threads the performance will be increased (less amount of time required). If
we use 8 threads we get around 64% performance gained. Also as the size of
matrix increases, the efficiency of parallelization also increases, which is
evident from the time difference between serial and parallel code. This is
because, more computations are done parallel and hence the efficiency is
high. Schedule type in OpenMP has different behavior, we used static, dynamic,
and guided scheme.
|
|
|
البحث (4):
|
فصل في كتاب
|
عنوان الفصل:
|
THREAT TAXONOMY FOR CLOUD OF THINGS
|
رابط إلى الفصل:
|
Click
here
|
تاريخ النشر:
|
27/12/2016
|
موجز عن الفصل:
|
In the last few years, the cloud
computing paradigm experienced a considerable growth, making it the de-facto
technology fuelling almost all major online services. At the same time, the
concept of Internet of Things has started to gain mainstream traction with
the promise to usher a new era of pervasive sensing using a weave of numerous
inter-connected IoT devices. Such IoT devices can generate an enormous amount
of data which becomes increasingly difficult to process using the limited
computational and storage capabilities of these devices. To tackle this
problem, a notion of a novel technology called Cloud of Things is emerging.
However, to harness the full potential of this new paradigm, different
security and privacy issues need to be properly analysed. The first step for
carrying out such an analysis is to define a well-constructed threat model.
In this chapter, we present a comprehensive threat model which is then
utilised to create a first-ever threat taxonomy for Cloud of Things. This
taxonomy outlines different security and privacy threats faced by this
nascent technology and can be used as the basis for further research on
security and privacy in Cloud of Things.
|
|
|
البحث (5):
|
|
عنوان البحث:
|
Security in
Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud
|
رابط إلى البحث:
|
Click
here
|
تاريخ النشر:
|
19/03/2017
|
موجز عن البحث:
|
Any organisation using the internet to
conduct business is vulnerable to violation of security. Currently security
in most organizations relates to protection of data and the management of
their business information systems. Hence, security is often defined as the
protection of information, the system, and hardware; that use, store and
relocates that information. Governing information and the secure use of
Information Technology (IT) is essential in order to reduce the possible
risks and improve an Organisation’s reputation, confidence and trust with its
customers. One of the importance success factors for an organization to adopt
and use the cloud effectively is information security governance (ISG). As a
consequence, this chapter clarifies the concept of governance and the
necessity of its two factors IT governance (ITG) and ISG.
Enterprise governance is directing and
controlling the organization by the board of directors and executive
management in order to ensure the success of the organization. ITG and ISG
are integral part of corporate governance. ITG is about the structure that
links IT processes, resources and information to support organisation’s
objectives. IT brings several risks and threats that need to be considered.
Therefore, Information security should not be considered as just a technical
issue but governance challenge that needs proactive approach. ISG consists of
leadership, organisational structure, processes, compliance and technology.
In order to promote the adoption of cloud computing, it is important to
recognize that an important and specific issue related to cloud computing is
the potential and perceived security risks posed by implementing such
technology. Adopting the cloud has several risks such as malicious insider
threats and data breaches. An example of cloud risk is virtualization that is
one of the concepts used for constructing cloud computing, which has its own
security risks, but they are not specific to the cloud. Virtualization is
related to open-source shared application server, database, and middleware
components. The multi-tenancy model has introduced security problems as it is
based on virtualization and sharing resources (hard disk, application
software, and virtual machine) on the same physical machine. This chapter
will present an overview of information security governance, the risks and
vulnerabilities when moving to the cloud.
|
|
|
البحث (6):
|
|
عنوان البحث:
|
Critical Success Factors
for Cloud Migration in Higher Education Institutions: A Conceptual Framework
|
رابط إلى البحث:
|
Click
here
|
تاريخ النشر:
|
07/03/2017
|
موجز عن البحث:
|
In the last few years, the
cloud-computing paradigm experienced a considerable growth, making it the
de-facto technology fueling almost all major online services. Nowadays,
Universities have become more reliant on Information and Communication
Technology (ICT) to provide educational services for their stakeholders.
While most of the Universities in Europe and North America has harnessed the
capabilities of cloud services to provide large scale flexibly electronic
educational services. In Saudi Arabia, Most of the Universities are start-ups
with limited IT Staff and amateur ICT infrastructure. Therefore, migrating
their ICT services to cloud computing could deliver substantial benefits in
the form of rich education content, increased efficiency, and agility that
can be used to transform higher education in Saudi universities. However,
migrating the Universities resources to third party platforms as cloud
computing has pitfalls need to be considered carefully prior to the
transition. Therefore, to successfully migrate to the cloud in the Saudi
universities context, it is essential to identify the enabler factors that
contribute toward a successful migration to the cloud environment in the
higher education settings. Therefore, this research paper aims to propose a
framework to investigate technological and organizational success factors
that enable the migration process of the Saudi Universities’ ICT to the cloud
environment.
|
البحث (7):
|
|
عنوان البحث:
|
A Framework for Critical Security Factors
that Influence the Decision of Cloud Adoption by Saudi Government Agencies
|
رابط إلى البحث:
|
Click
here
|
تاريخ النشر:
|
25/04/2017
|
موجز عن البحث:
|
Cloud computing technologies can play
an essential role in public organisations and companies while it reduces the
cost of using information technology services. It allows users to access the
service anytime and anywhere, with paying for what they use. In developing
countries, such as Saudi Arabia, the cloud computing is still not extensively
adopted, compared to countries in the west. In order to encourage the
adoption of cloud services, it is considerable to understand an important and
particular complications regarding to cloud computing is the potential and
perceived security risks and benefits posed by implementing such technology.
This paper investigates the critical security factors that influence the
decision to adopt cloud computing by Saudi government agencies. A framework
was proposed for three categories, Social Factors category, Cloud Security
Risks Category and Perceived Cloud Security Benefits that includes well-known
cloud security features. The framework factors were identified by critically reviewing
studies found in the literature together with factors from the industrial
standards within the context of Saudi Arabia. An experiment study was
conducted in five government agencies in Saudi Arabia by interview and
questionnaire with experts in order to improve and confirm the framework. All
the factors in the proposed framework were found to be statistically
significant. An additional factor identified was Failure of client side
encryption. Moreover, they suggested including this factor as a potential
risk under Security Risk Factors Category. The initial framework was updated
based on the expert reviews and questionnaires. The results were analysed via
one sample t-test with the data integrity analysed via Cronbach’s alpha. The
outcome indicated the majority of cloud security adoption framework
categories were statistically significant. Potential future study directions
and contributions are discussed.
|
|
|
المؤتمرات العلمية:
|
|
المؤتمر (1):
|
|
عنوان المؤتمر:
|
Fifth International Conference on Future Generation
Communication Technologies (FGCT2016)
|
تاريخ الإنعقاد:
|
17-18/08/2016
|
مكان
الإنعقاد:
|
University of Bedfordshire, Luton, UK
|
طبيعة المشاركة:
|
Oral presentation
|
عنوان المشاركة:
|
Data Security in Cloud Computing
|
ملخص المشاركة:
|
This
paper discusses the security of data in cloud computing. It is a study of
data in the cloud and aspects related to it concerning security. The paper
will go in to details of data protection methods and approaches used
throughout the world to ensure maximum data protection by reducing risks and
threats. Availability of data in the cloud is beneficial for many
applications but it poses risks by exposing data to applications which might
already have security loopholes in them. Similarly, use of virtualization for
cloud computing might risk data when a guest OS is run over a hypervisor
without knowing the reliability of the guest OS which might have a security
loophole in it. The paper will also provide an insight on data security
aspects for Data-in-Transit and Data-at-Rest. The study is based on all the
levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS
(Infrastructure as a Service).
|
|
|
المؤتمر (2):
|
|
عنوان المؤتمر:
|
International
Conference on Information Society (i-Society 2016)
|
تاريخ الإنعقاد:
|
10-13/10/2016
|
مكان
الإنعقاد:
|
Dublin, Ireland
|
طبيعة المشاركة:
|
Oral presentation
|
عنوان المشاركة:
|
Security Risk factors that influence Cloud Computing
Adoption in Saudi Arabia Government Agencies
|
ملخص المشاركة:
|
Cloud
computing technologies play a substantial role in public organizations and
private sector companies since it reduces the cost of using information
technology services and allows users to access the service anytime and everywhere,
whilst only paying for what they use. In developing countries, such as Saudi
Arabia, the cloud computing is still not widely adopted, compared to
countries in the west. In order to promote the adoption of cloud computing,
it is important to recognize that an important and specific issue related to
cloud computing is the potential and perceived security risks posed by
implementing such technology. Therefore, the aim of this research is to
investigate the security risk factors that influence organization to adopt
cloud computing in a Saudi Arabia context. This research proposed a framework
for the successful adoption of cloud computing, focused on risks when
implementing security in the cloud system.
|
|
|
المؤتمر (3):
|
|
عنوان المؤتمر:
|
International Conference on Information
Society (i-Society 2016)
|
تاريخ الإنعقاد:
|
10-13/10/2016
|
مكان
الإنعقاد:
|
Dublin, Ireland
|
طبيعة المشاركة:
|
Oral presentation
|
عنوان المشاركة:
|
Towards a framework to enable the migration process
to educational clouds in Saudi higher education
|
ملخص المشاركة:
|
Nowadays,
Universities have become more reliant on Information and Communication
Technology (ICT) to provide educational services for their stakeholders.
While most of the Universities in Europe and North America has harnessed the
capabilities of cloud services to provide large scale flexibly electronic
educational services. In Saudi Arabia, Most of the Universities are start-ups
with limited IT Staff and amateur ICT infrastructure. Therefore, migrating
their ICT services to cloud computing could deliver substantial benefits in
the form of rich education content, increased efficiency, and agility that
can be used to transform higher education in Saudi universities. However, to
successfully migrate to the cloud in the Saudi universities context, it is
essential to identify the enabler factors that contribute toward a successful
migration to the cloud environment in the higher education settings.
Therefore, this research paper aims to propose a framework to investigate
technological and organizational success factors that enable the migration
process of the Saudi Universities’ ICT to the cloud environment.
|