Computational Intelligence Techniques for Data Security and User Access Control

Mohammadian, M. (Speaker)

Activity: Talk or presentationInvited talk


Data security and privacy play a key role in carrying out day to day and long-term business operations successfully. Organizations recognize the value of their data and need for proper data protection facilities and services. Therefore, implementing and applying policies for data security and privacy has become a significant activity for large organizations. One novel method used to achieve data security is to use computational intelligence techniques such as fuzzy logic for data classification to determine the required data security levels based on various government and business policies for organizations. Data classification process allows organizations to classify their data according to the policies. Data classification is a laborious in large organizations with significant data to be evaluated and categorized. Computational intelligence techniques can identify and apply appropriate data policies and security settings such as data access control and encryption requirements data used in organizations. This talk will explore the use of hierarchical fuzzy logic classification based on Mohammadian and Hatzinakos [Data classification process for security and privacy based on a fuzzy logic classifier] and suggests a method that can determine requirements for data security and privacy in organizations based on organizational needs and government policies imposed on data. This talk will discuss several novel applications of a hierarchical fuzzy logic classification system to categorize data based on governmental and business data policies and it demonstrates how the use of a hierarchical fuzzy logic system improves the data classification by reducing the number of rules required in the fuzzy knowledge base system of the hierarchical fuzzy logic data classification system. A demonstration of how a hierarchical fuzzy logic system can be developed to improve data security, privacy and user access control to accurately determine data and user access control to access and data manipulation based on data sensitivity, security and privacy level of data in organizations.
Period26 Jun 2019
Event titleInternational Conference on Innovations in Computer Science and <br/>Engineering (iCiCSE2019)<br/>
Event typeConference
LocationMiri, Malaysia
Degree of RecognitionInternational