{"id":"https://openalex.org/W4360585157","doi":"https://doi.org/10.1109/ic3i56241.2022.10072640","title":"Preventing Critical Information framework against Cyber-Attacks using Cloud Computing and Big Data Analytics","display_name":"Preventing Critical Information framework against Cyber-Attacks using Cloud Computing and Big Data Analytics","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585157","doi":"https://doi.org/10.1109/ic3i56241.2022.10072640"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072640","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072640","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015271317","display_name":"Veera Talukdar","orcid":"https://orcid.org/0000-0002-9204-5825"},"institutions":[{"id":"https://openalex.org/I332121957","display_name":"Kaziranga University","ror":"https://ror.org/00vadgf54","country_code":"IN","type":"education","lineage":["https://openalex.org/I332121957"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Veera Talukdar","raw_affiliation_strings":["The Assam Kaziranga University,Assam","The Assam Kaziranga University, Assam"],"affiliations":[{"raw_affiliation_string":"The Assam Kaziranga University,Assam","institution_ids":["https://openalex.org/I332121957"]},{"raw_affiliation_string":"The Assam Kaziranga University, Assam","institution_ids":["https://openalex.org/I332121957"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034454224","display_name":"Shivaji Bothe","orcid":null},"institutions":[{"id":"https://openalex.org/I4210115345","display_name":"Sri Balaji Vidyapeeth University","ror":"https://ror.org/02avh2k34","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210115345"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shivaji Bothe","raw_affiliation_strings":["Sri Balaji University Pune (SBUP),Department of IT &#x0026; Business Analytics"],"affiliations":[{"raw_affiliation_string":"Sri Balaji University Pune (SBUP),Department of IT &#x0026; Business Analytics","institution_ids":["https://openalex.org/I4210115345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010705375","display_name":"Rajesh Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I3132702812","display_name":"Uttaranchal University","ror":"https://ror.org/00ba6pg24","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132702812"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajesh Singh","raw_affiliation_strings":["Uttaranchal University,Uttaranchal Institute of Technology,Dehradun,Uttarakhand,India","Uttaranchal Institute of Technology, Uttaranchal University, Dehradun, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Uttaranchal University,Uttaranchal Institute of Technology,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I3132702812"]},{"raw_affiliation_string":"Uttaranchal Institute of Technology, Uttaranchal University, Dehradun, Uttarakhand, India","institution_ids":["https://openalex.org/I3132702812"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002464639","display_name":"R. Ponnusamy","orcid":"https://orcid.org/0000-0001-8164-5297"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Ponnusamy","raw_affiliation_strings":["Chennai Institute of Technology,Department of Computer Science &#x0026; Engineering,Chennai,Tamilnadu,India"],"affiliations":[{"raw_affiliation_string":"Chennai Institute of Technology,Department of Computer Science &#x0026; Engineering,Chennai,Tamilnadu,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004264981","display_name":"Unnati Joshi","orcid":"https://orcid.org/0000-0003-0018-0913"},"institutions":[{"id":"https://openalex.org/I4210112983","display_name":"Parul University","ror":null,"country_code":"IN","type":null,"lineage":["https://openalex.org/I4210112983"]},{"id":"https://openalex.org/I9694494","display_name":"Parul University","ror":"https://ror.org/024v3fg07","country_code":"IN","type":"education","lineage":["https://openalex.org/I9694494"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Unnati Joshi","raw_affiliation_strings":["Parul University,Department of PIET,Gujarat,India","Department of PIET, Parul University, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Parul University,Department of PIET,Gujarat,India","institution_ids":["https://openalex.org/I4210112983"]},{"raw_affiliation_string":"Department of PIET, Parul University, Gujarat, India","institution_ids":["https://openalex.org/I9694494"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032769944","display_name":"Suryansh Bhaskar Talukdar","orcid":"https://orcid.org/0009-0000-7224-1514"},"institutions":[{"id":"https://openalex.org/I464993","display_name":"Barkatullah University","ror":"https://ror.org/02ax13658","country_code":"IN","type":"education","lineage":["https://openalex.org/I464993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Suryansh Talukdar","raw_affiliation_strings":["VIT Bhopal University,School of Computer Science and Engineering","School of Computer Science and Engineering, VIT Bhopal University"],"affiliations":[{"raw_affiliation_string":"VIT Bhopal University,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I464993"]},{"raw_affiliation_string":"School of Computer Science and Engineering, VIT Bhopal University","institution_ids":["https://openalex.org/I464993"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5015271317"],"corresponding_institution_ids":["https://openalex.org/I332121957"],"apc_list":null,"apc_paid":null,"fwci":0.606,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76299645,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"1812","last_page":"1817"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7736912965774536},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7089104652404785},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6449268460273743},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.625590443611145},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6153691411018372},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5358577370643616},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5222197771072388},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.43855318427085876},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.43726351857185364},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.42817431688308716},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.42211097478866577},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4152572751045227},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.28607475757598877},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.0913606584072113}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7736912965774536},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7089104652404785},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6449268460273743},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.625590443611145},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6153691411018372},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5358577370643616},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5222197771072388},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.43855318427085876},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.43726351857185364},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.42817431688308716},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.42211097478866577},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4152572751045227},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.28607475757598877},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0913606584072113},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072640","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072640","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W33071484","https://openalex.org/W565292247","https://openalex.org/W761890246","https://openalex.org/W1520457013","https://openalex.org/W1560461363","https://openalex.org/W1566558397","https://openalex.org/W1967738308","https://openalex.org/W1982354667","https://openalex.org/W1996937315","https://openalex.org/W2000344416","https://openalex.org/W2011070474","https://openalex.org/W2026364949","https://openalex.org/W2071264254","https://openalex.org/W2088122776","https://openalex.org/W2128101897","https://openalex.org/W2136812936","https://openalex.org/W2156247525","https://openalex.org/W2172611079","https://openalex.org/W2174724096","https://openalex.org/W2175561235","https://openalex.org/W2176555030","https://openalex.org/W2177464891","https://openalex.org/W2178226047","https://openalex.org/W2180617886","https://openalex.org/W2242198403","https://openalex.org/W2244935981","https://openalex.org/W2247267214","https://openalex.org/W2248758352","https://openalex.org/W2249333166","https://openalex.org/W2260785505","https://openalex.org/W2316890442","https://openalex.org/W2334793245","https://openalex.org/W2765329640","https://openalex.org/W2945815268","https://openalex.org/W2982657588","https://openalex.org/W2996908335","https://openalex.org/W3153045320","https://openalex.org/W3191606084","https://openalex.org/W4285815732","https://openalex.org/W4317856651","https://openalex.org/W6601315180","https://openalex.org/W6848803911"],"related_works":["https://openalex.org/W3005543248","https://openalex.org/W3205687007","https://openalex.org/W4362685783","https://openalex.org/W4320802206","https://openalex.org/W2493430149","https://openalex.org/W4242728933","https://openalex.org/W4366290225","https://openalex.org/W2767924451","https://openalex.org/W3191735619","https://openalex.org/W2460691332"],"abstract_inverted_index":{"The":[0],"rapid":[1],"development":[2],"of":[3,14,30,33,62,66,73],"cybersecurity":[4],"insurance":[5,43],"has":[6,122],"been":[7,38],"driven":[8],"by":[9,40],"the":[10,31,51,55,67,71,124],"noticeably":[11],"rising":[12],"expectations":[13],"financial":[15],"firms":[16],"to":[17],"mitigate":[18],"costs":[19],"from":[20],"cyber":[21,34,46,101,115],"security.":[22],"Hacking":[23],"and":[24,93,109,126],"fraud":[25],"is":[26,48,76,110],"just":[27],"a":[28,60,87,95],"couple":[29],"areas":[32],"incidents":[35],"that":[36],"have":[37,58],"covered":[39],"Cyber":[41,83],"security":[42,47,84],"systems.":[44],"However,":[45],"still":[49],"in":[50],"exploratory":[52],"phase,":[53],"thus":[54],"existing":[56],"applications":[57],"discovered":[59],"number":[61],"new":[63],"dimensions.":[64],"One":[65],"major":[68],"problems":[69],"preventing":[70],"expansion":[72],"essential":[74],"infrastructure":[75],"cyberattacks":[77],"against":[78],"it.":[79],"This":[80],"paper":[81],"discusses":[82],"deployments":[85],"with":[86],"focus":[88],"on":[89],"cloud-based":[90],"service":[91],"offerings":[92],"offers":[94],"big":[96],"data-based":[97],"methodology":[98],"for":[99,112],"secure":[100],"incident":[102],"analyses.":[103],"Our":[104],"method":[105],"employs":[106],"repository":[107],"data":[108],"intended":[111],"matching":[113],"various":[114],"risk":[116],"situations.":[117],"Theoretically":[118],"speaking,":[119],"our":[120],"simulation":[121],"demonstrated":[123],"viability":[125],"adoption.":[127]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
