{"id":389,"date":"2025-12-05T02:13:44","date_gmt":"2025-12-05T02:13:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/?page_id=389"},"modified":"2025-12-05T02:13:44","modified_gmt":"2025-12-05T02:13:44","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/article-review-2\/","title":{"rendered":"Article Review # 2"},"content":{"rendered":"\n<p>Article Review Security Enhanced Cloud Computing Using the Integration of Dense<br>Belief Network and RK-AES Algorithm<br>Student Name: Keeon Allen<br>School of Cybersecurity, Old Dominion University<br>CYSE 201S: Cybersecurity and the Social Sciences<br>Date: 11\/14\/25<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Introduction<br>This article examines the growing security vulnerabilities in cloud computing and<br>proposes a combined deep learning and encryption framework to enhance data protection.<br>The bottom line up front: the AES-RK-DBN model increases detection accuracy,<br>improves encryption strength, and provides a scalable security solution for modern cloud<br>systems.<br>Relation to Social Science Principles<br>Cloud security is fundamentally connected to social science principles because<br>technology directly influences human behavior, organizational structures, trust, and risk<br>perception. The article aligns principles such as culture, interactions, social systems, and<br>ethical decision making. User trust in institutional policies, and social behavior around<br>adoption of cloud services all depend on whether security is strong and reliable.<br>Research Question, Hypothesis, Independent &amp; Dependent Variables<br>Research Question: Can integrating an enhanced AES encryption algorithm with a<br>Dense Belief Network improve cloud security and intrusion-detection accuracy?<br>Hypothesis: The authors hypothesize that the AES-RK-DBN system will outperform<br>existing deep-learning architectures in identifying malicious activity.<br>Independent Variable: The security model used (AES-RK-DBN vs. other DL models.<br>Dependent Variable: System performance outcomes, including detection accuracy,<br>sensitivity, specificity, F-score, and encryption effectiveness.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Types of Research Methods Used<br>The study uses quantitative research methods to evaluate security performance.<br>Data was obtained from established intrusion-detection datasets (KDDCup99, NSL-<br>KDD, UNSW-NB15). The researchers conducted computational experiments to compare<br>multiple models under identical conditions. No qualitative human-subject data was<br>collected.<br>Types of Data and Analysis Used<br>Data consisted of labeled intrusion-detection records. Analysis techniques<br>included Principal Component Analysis (PCA) for dimensionality reduction, statistical<br>performance measurement and computational benchmarking across several deep-learning<br>architectures. The quantitative comparisons allowed the authors to validate improvements<br>in performance and efficiency.<br>Connections to Course Concepts<br>The article connects directly to course concepts such as risk, threat modeling,<br>confidentiality, data governance, and human-technology interaction. Course materials<br>emphasize how cybersecurity problems exist within social systems and how human<br>decisions shape technological outcomes. The study reinforces lessons about the<br>importance of designing systems that balance security with usability and reliability. It<br>also aligns with course discussions of AI-supported defense mechanisms and the role of<br>encryption in maintaining trust in digital environments.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Connections to Marginalized Groups<br>Cloud security impacts marginalized groups by shaping access to safe digital services,<br>financial platforms, healthcare portals, and communication tools. Weak cloud security<br>disproportionately harms communities already at higher risk of surveillance, data misuse,<br>and identity theft. While the article does not explicitly focus on marginalized groups, its<br>contributions indirectly support them by improving confidentiality, reducing<br>unauthorized monitoring, and promoting equitable data protection across user<br>populations.<br>Overall Societal Contributions \/ Conclusion<br>This study advances society\u2019s understanding of secure cloud infrastructures by<br>demonstrating that integrating encryption with intelligent intrusion detection improves<br>both efficiency and accuracy. Stronger cloud security increases public trust, supports<br>economic growth, and enhances data privacy for individuals and organizations. The AES-<br>RK-DBN model provides a foundation for future research in intelligent cybersecurity<br>systems and contributes to building a safer, more resilient digital environment.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Reference<br>Al-Safarini, M. Y., Al-Milli, N., Maghrabi, L. A., &amp; Elian, M. (2025). Security Enhanced<br>Cloud Computing Using the Integration of Dense Belief Network and RK-AES Algorithm.<br>International Journal of Cyber Criminology, 19(1), 154\u2013179.<br>Article Link: https:\/\/www.cybercrimejournal.com\/Al-<br>Safarinietalvol19issue1IJCC2025.p<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review Security Enhanced Cloud Computing Using the Integration of DenseBelief Network and RK-AES AlgorithmStudent Name: Keeon AllenSchool of Cybersecurity, Old Dominion UniversityCYSE 201S: Cybersecurity and the Social SciencesDate: 11\/14\/25 IntroductionThis article examines the growing security vulnerabilities in cloud computing andproposes a combined deep learning and encryption framework to enhance data protection.The bottom line up&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31460,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/389"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/users\/31460"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/comments?post=389"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/389\/revisions"}],"predecessor-version":[{"id":391,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/389\/revisions\/391"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/media?parent=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}