{"id":258,"date":"2026-04-25T17:55:07","date_gmt":"2026-04-25T17:55:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alewi073\/?p=258"},"modified":"2026-04-25T17:56:24","modified_gmt":"2026-04-25T17:56:24","slug":"article-review-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/article-review-1\/","title":{"rendered":"Article Review #1"},"content":{"rendered":"\n<p><strong>Security Enhanced Cloud Computing Using the Integration of Dense Belief Network and<br>RK-AES Algorithm<\/strong><\/p>\n\n\n\n<p><strong>Introduction\/BLUF:<\/strong><br>The article by Al-Sadarini et al. (2025) examines how cloud security can be improved by<br>combining deep learning with encryption methods. As cloud computing becomes more<br>widely used for storing sensitive information, the risk of cyberattacks also increases. The<br>authors introduce a hybrid framework called AES-RKDBN that detects intrusions using a<br>Dense Belief Network and encrypts data using an enhanced AES method before it is stored.<br><\/p>\n\n\n\n<p><strong>BLUF:<\/strong><br>The study concludes that integrating intrusion detection with encryption improves cloud<br>security performance compared to existing deep learning models.<br><\/p>\n\n\n\n<p><strong>Research Question, Hypothesis, IV and DV:<\/strong><br>The main research question asks whether combining a Dense Belief Network with the RK-<br>AES algorithm improves cloud security effectiveness. The hypothesis is that this integrated<br>model will outperform existing systems in detecting and preventing intrusions.<br>The independent variable is the implementation of the AES-RK-DBN framework. The<br>dependent variables include measurable security outcomes such as accuracy, detection<br>rate, sensitivity, recall, and overall system performance.<br><\/p>\n\n\n\n<p><strong>Research Methods and Data Analysis:<\/strong><br>The study uses a quantitative experimental design. The researchers tested their model<br>using cloud security datasets and compared the results to other deep learning approaches<br>such as LSTM and CNN-based models.<br>Performance was evaluated using statistical measures including detection accuracy,<br>specificity, recall, and f-score. By comparing measurable results across models, the<br>authors were able to determine whether their system performed more effectively.<br><\/p>\n\n\n\n<p><strong>Connection to Social Science and Course Concepts:<\/strong><br>Although technical, this study connects to social science principles because cybersecurity<br>affects trust, risk, and institutional responsibility. Cloud users must trust providers to<br>protect sensitive information. When security fails, it impacts businesses and individuals<br>socially and economically.<br>The article also connects to Routine Activities Theory. Cybercrime occurs when there is a<br>motivated offender, a suitable target, and a lack of capable guardianship. The proposed<br>framework strengthens guardianship by improving detection and encryption.<\/p>\n\n\n\n<p>Reinforcement Sensitivity Theory is also relevant. Individuals who are impulsive or reward<br>driven may engage in cybercrime if the perceived benefits outweigh the risks. Stronger<br>detection systems reduce successful attacks and increase perceived risk.<br><\/p>\n\n\n\n<p><strong>Marginalized Groups and Conclusion:<\/strong><br>Improving cloud security benefits marginalized communities who rely on affordable cloud<br>services and may lack resources to recover from cyberattacks. Stronger encryption and<br>detection help protect sensitive data from exploitation.<br>In conclusion, the study contributes to society by improving cloud security through an<br>integrated technical approach that strengthens digital trust and reduces opportunities for<br>cyber offending.<br><\/p>\n\n\n\n<p>References:<br>Al-Safarini, M. Y., Al-Milli, N., Maghrabi, L. A., &amp; Elian, M. (2025). Security enhanced cloud<br>computing using the integration of dense belief network and RK-AES algorithm.<br>International Journal of Cyber Criminology<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Enhanced Cloud Computing Using the Integration of Dense Belief Network andRK-AES Algorithm Introduction\/BLUF:The article by Al-Sadarini et al. (2025) examines how cloud security can be improved bycombining deep learning with encryption methods. As cloud computing becomes morewidely used for storing sensitive information, the risk of cyberattacks also increases. Theauthors introduce a hybrid framework called [&hellip;]<\/p>\n","protected":false},"author":32118,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/258"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/users\/32118"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/comments?post=258"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/258\/revisions"}],"predecessor-version":[{"id":259,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/258\/revisions\/259"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/media?parent=258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/categories?post=258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/tags?post=258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}