Theses for Computer Science
Permanent URI for this collection
Browse
Browsing Theses for Computer Science by Author "AL HANTOOBI, SENDEYAH"
Now showing 1 - 1 of 1
Results Per Page
Sort Options
Item A Decision Modelling Approach for Security Modules of Delegation Methods in Mobile Cloud Computing using Probabilistic Interval Neutrosophic Hesitant Fuzzy Set(The British University in Dubai (BUiD), 2023-03) AL HANTOOBI, SENDEYAHMobile Cloud Computing (MCC) has become a pervasive technology that offers on-demand, flexible, and scalable computing resources to mobile devices. However, the security issues associated with MCC have become a major concern for users and organizations, leading to the development of various Security Modules. These modules typically use delegation methods that involve the transfer of data or operations from mobile devices to the cloud to perform the task at the best performance and security levels. Despite extensive attempts to design secure security modules of delegation in Mobile Cloud Computing (MCC), none of the existing modules possess all the necessary development attributes. Our analysis indicates that previous studies have not used security development attributes as evaluation criteria to compare and assess the available Security modules of delegation methods in MCC. However, Modeling these modules is critical and poses significant challenges in selecting the most secure security module. du to multicriteria, importance of data and data variation. To address this issue, this study proposes a Decision Modelling Approach for Security Modules of Delegation Methods in Mobile Cloud Computing using multi-criteria decision-making (MCDM) methods. The proposed approach involves the integration of Evaluation based on Distance from Average Solution (EDAS) method with fuzzy weighted with zero inconsistency (FWZIC) under Probabilistic Interval Neutrosophic Hesitant Fuzzy Set (PINHFS) environment. . The framework presented in this study involves two primary stages : the construction of decision matrices for Security Modules of delegation methods in MCC and the application of the PINHFS-FWZIC method to determine the weight of the security evaluation criteria. The EDAS method is then employed to modeling the Security Modules of delegation methods in MCC based on the formulated decision matrices and criteria weight. The validation and evaluation of the proposed framework were conducted through model validation and decision evaluation procedures. Model validation involved sensitivity analysis and systematic ranking procedures . The benchmarking checklist was used to compare the results of the proposed framework with the existing approaches. Based on the findings, it can be concluded that the proposed framework can efficiently weight the security criteria and successfully rank Security Modules of delegation methods in MCC. The PINHFS-FWZIC method effectively handled the uncertainty and hesitancy of the decision-makers in assigning weights to the evaluation criteria. Overall, the proposed framework provides a useful benchmark for evaluating other Security Modules of delegation methods in MCC. It can aid decision-makers in selecting the most secure MCC delegation method system by providing a comprehensive evaluation and Modeling of the available Security Modules.