Afficher la notice abrégée
| dc.rights.license |
CC BY |
eng |
| dc.contributor.author |
Al Hantoobi, Sendeyah |
cze |
| dc.contributor.author |
Zaidan, A. A. |
cze |
| dc.contributor.author |
Ibrahim, Hassan Abdulsattar |
cze |
| dc.contributor.author |
Qahtan, Sarah |
cze |
| dc.contributor.author |
Deveci, Muhammet |
cze |
| dc.contributor.author |
Isik, Sinan |
cze |
| dc.contributor.author |
Tomášková, Hana |
cze |
| dc.date.accessioned |
2025-12-05T16:13:25Z |
|
| dc.date.available |
2025-12-05T16:13:25Z |
|
| dc.date.issued |
2025 |
eng |
| dc.identifier.issn |
1568-4946 |
eng |
| dc.identifier.uri |
http://hdl.handle.net/20.500.12603/2484 |
|
| dc.description.abstract |
The security models of delegation methods in mobile cloud computing (MCC) play a crucial role in mitigating security threats when offloading device operations to the cloud while ensuring optimal performance. These threats include data breaches, unauthorized access, and loss of control over sensitive data. Although numerous security models have been developed for different delegation methods, categorized under layering, authentication, dynamic offloading, and encryption, none fully satisfy all development security criteria despite extensive research efforts. To address this gap, this paper proposes a decision-modeling approach to identify the most effective security modules for delegation methods in MCC. Such problem falls under multi-criteria decision-making (MCDM) due to (1) the presence of multiple development security criteria, (2) the varying importance of these criteria with inherent ambiguity and uncertainty, and (3) data variation. To achieve this, we developed a fuzzy-weighted zero-inconsistency method (FWZIC) under a probabilistic interval neutrosophic hesitant fuzzy set (PINHFS) and the evaluation based on distance from the average solution (EDAS) technique. In addition, the decision matrix in this paper is constructed by crossing 50 security modules from four delegation methods in MCC, categorized as follows: 23 encryption, 12 authentication, 9 layering, and 6 dynamic offloading modules, evaluated based on 13 development security criteria. The findings of PINHFS-FWZIC method indicate that C7 'Data Security' was the most critical and sensitive evaluation criterion, while C1 'General Security Issue' was the least sensitive. According to the EDAS results, SM_07 ranked highest for layering and encryption-based dele-gation methods. For dynamic offloading, SM_02 and SM_03 achieved the top ranking, while for authentication, SM_02 and SM_03 were also identified as the best security modules. To validate the robustness of the proposed approach, sensitivity analysis, Spearman's correlation coefficient test, and comparative analysis were conducted. The results confirm that the proposed approach provides a comprehensive and reliable method for selecting optimal security modules in MCC delegation methods. |
eng |
| dc.format |
p. "Article Number: 113089" |
eng |
| dc.language.iso |
eng |
eng |
| dc.publisher |
Elsevier |
eng |
| dc.relation.ispartof |
Applied soft computing, volume 175, issue: May |
eng |
| dc.subject |
EDAS |
eng |
| dc.subject |
FWZIC |
eng |
| dc.subject |
mobile cloud computing |
eng |
| dc.subject |
multi-criteria decision-making |
eng |
| dc.subject |
probabilistic interval neutrosophic hesitant |
eng |
| dc.subject |
fuzzy set |
eng |
| dc.title |
Security modules of delegation methods in mobile cloud computing using probabilistic interval neutrosophic hesitant fuzzy set based decision-making model |
eng |
| dc.type |
article |
eng |
| dc.identifier.obd |
43882335 |
eng |
| dc.identifier.wos |
001464851100001 |
eng |
| dc.identifier.doi |
10.1016/j.asoc.2025.113089 |
eng |
| dc.publicationstatus |
postprint |
eng |
| dc.peerreviewed |
yes |
eng |
| dc.source.url |
https://www.sciencedirect.com/science/article/pii/S1568494625004004?via%3Dihub |
cze |
| dc.relation.publisherversion |
https://www.sciencedirect.com/science/article/pii/S1568494625004004?via%3Dihub |
eng |
| dc.rights.access |
Open Access |
eng |
Fichier(s) constituant ce document
Ce document figure dans la(les) collection(s) suivante(s)
Afficher la notice abrégée