Javascript must be enabled to continue!
A Deep Learning Driven Cloud Edge Intelligence Framework for Real-Time Big Data Based Cyber-Security Threat Detection
View through CrossRef
Purpose: This paper proposes a Secure Unified Data Model (UDM) Approach that enhances data security, trust, and reliability in Cyber-Physical Systems (CPS) by addressing data security risks such as breaches and unauthorized access.
Methodology: The methodology involved several steps. Reviewing existing literature to understand the current state of data modeling in Cyber-Physical Systems (CPS) and identify potential vulnerabilities. Supported by threat modeling and risk assessment frameworks, it analyzed data security risks for the Unified Data Model (UDM) in CPS. The focus was on protecting the UDM through strong encryption, access controls, security training, and regular assessments, safeguarding data at rest and in transit.
Findings: The findings show that a Secure Unified Data Model (UDM) approach improves data security in Cyber-Physical Systems (CPS) by strengthening access controls, encryption, and anomaly detection, thereby increasing CPS resilience against cyber threats. This promotes adoption in healthcare, smart cities, and governance. The secure UDM in CPS lowers breach risks, protects vendors and organizations, and offers scalable solutions that enhance productivity and reduce analytics costs. It supports safe data visualization, Business Intelligence (BI), and Artificial Intelligence (AI) tools, with potential applications in law enforcement for secure information sharing. The Secure UDM boosts trust, reliability, and compliance with data protection laws, encouraging adoption and innovation in critical sectors.
Unique Contribution to Theory, Practice and Policy: involves developing a conceptual Secure UDM framework that combines access controls, encryption, and anomaly detection for CPS. It also enhances understanding of UDM security in CPS contexts. Practically, this study provides actionable strategies for implementing secure UDMs across sectors such as healthcare, smart cities, and governance, thereby improving data security and trust in CPS through practical mitigation measures. Policy-wise, the study informs data protection regulations and standards for CPS and UDMs and encourages the adoption of secure UDM practices in critical sectors.
CARI Journals Limited
Title: A Deep Learning Driven Cloud Edge Intelligence Framework for Real-Time Big Data Based Cyber-Security Threat Detection
Description:
Purpose: This paper proposes a Secure Unified Data Model (UDM) Approach that enhances data security, trust, and reliability in Cyber-Physical Systems (CPS) by addressing data security risks such as breaches and unauthorized access.
Methodology: The methodology involved several steps.
Reviewing existing literature to understand the current state of data modeling in Cyber-Physical Systems (CPS) and identify potential vulnerabilities.
Supported by threat modeling and risk assessment frameworks, it analyzed data security risks for the Unified Data Model (UDM) in CPS.
The focus was on protecting the UDM through strong encryption, access controls, security training, and regular assessments, safeguarding data at rest and in transit.
Findings: The findings show that a Secure Unified Data Model (UDM) approach improves data security in Cyber-Physical Systems (CPS) by strengthening access controls, encryption, and anomaly detection, thereby increasing CPS resilience against cyber threats.
This promotes adoption in healthcare, smart cities, and governance.
The secure UDM in CPS lowers breach risks, protects vendors and organizations, and offers scalable solutions that enhance productivity and reduce analytics costs.
It supports safe data visualization, Business Intelligence (BI), and Artificial Intelligence (AI) tools, with potential applications in law enforcement for secure information sharing.
The Secure UDM boosts trust, reliability, and compliance with data protection laws, encouraging adoption and innovation in critical sectors.
Unique Contribution to Theory, Practice and Policy: involves developing a conceptual Secure UDM framework that combines access controls, encryption, and anomaly detection for CPS.
It also enhances understanding of UDM security in CPS contexts.
Practically, this study provides actionable strategies for implementing secure UDMs across sectors such as healthcare, smart cities, and governance, thereby improving data security and trust in CPS through practical mitigation measures.
Policy-wise, the study informs data protection regulations and standards for CPS and UDMs and encourages the adoption of secure UDM practices in critical sectors.
Related Results
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Advancements in Cloud Security: Leveraging Machine Learning for Threat Detection
Advancements in Cloud Security: Leveraging Machine Learning for Threat Detection
Cloud security is becoming increasingly vital as organizations migrate their data and services to cloud infrastructures. This paper investigates the integration of machine learning...
Research on Cybersecurity Threat Prediction and Prevention Technology for Intelligent Housing Combined with Edge Computing
Research on Cybersecurity Threat Prediction and Prevention Technology for Intelligent Housing Combined with Edge Computing
As an important application scenario for the development of Internet of Things (IoT) technology, smart housing is facing unprecedented challenges in its network security. The tradi...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Magic graphs
Magic graphs
DE LA TESIS<br/>Si un graf G admet un etiquetament super edge magic, aleshores G es diu que és un graf super edge màgic. La tesis està principalment enfocada a l'estudi del c...

