Matematik ve Bilgisayar Bölümü / Department of Mathematics and Computer Science
Permanent URI for this collectionhttps://hdl.handle.net/11413/6787
Browse
Browsing Matematik ve Bilgisayar Bölümü / Department of Mathematics and Computer Science by Author "AKBULUT, AKHAN"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Publication Embargo Automated testing for distributed databases with fuzzy fragment reallocation(TUBİTAK Scientific & Technical Research Council Turkey, Ataturk Bulvarı No 221, Kavaklıdere, Ankara, 00000, Turkey, 2018) AKBULUT, AKHAN; BAYDOĞMUŞ, GÖZDE KARATAŞ; 116056; 110942As the Internet and big data become more widespread, relational database management systems (RDBMSs) become increasingly inadequate for web applications. To provide what RDBMSs cannot, during the past 15 years distributed database systems (DDBSs) have thus emerged. However, given the complicated structure of these systems, the methods used to validate the efficiency of databases, all towards ensuring quality and security, have become diversified. In response, this paper demonstrates a system for performing automated testing with DDBSs, given that testing is significant in software verification and that accredited systems are more productive in business environments. The proposed system applies several tests to MongoDB-based NoSQL databases to evaluate their instantaneous conditions, such as average query response times and fragment utilizations, and, if necessary, suggest improvements for indexes and fragment deployment. Within this context, autogenerated data, replica, meta, system, fragment, and index tests are applied. Clearly, the system's most important feature is its fuzzy logic-enabled fragment reallocation module, which allows the creation and application of reallocation strategies that account for data changes in query frequency.Publication Embargo Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler(Istanbul Commerce University, 2016-09-30) Zaim, Abdül Halim; AKBULUT, AKHAN; BAYDOĞMUŞ, GÖZDE KARATAŞ; 110942; 116056The most common form of today’s consumer electronics is the use of mobile devices. The technological developments in this area are increasing in such a way as to affect all aspects of our lives and give direction to our life. The use of mobile devices, which can now have the same hardware features as computers, is not only for communication but also enriched by applications in the areas of internet use, business, hobby and health. Increased usage rate and the need for information and communication security are beginning to be needed and it is necessary to ensure the security of the information carried against the attacks against these devices. Due to security vulnerabilities in mobile devices and malicious software loaded applications by end users, there are situations that threaten personal information and communication security. This study describes security vulnerabilities, attacks in mobile applications and precautions for those problems. It summarizes not only the end-user's recommendations, but also the points to note for app developers. It is evaluated that end users can increase personal security by learning basic info for attack methods of mobile systems.Publication Metadata only Multi-tenant architectures in the cloud: a systematic mapping study(IEEE, 345 E 47Th St, New York, Ny 10017 USA, 2017) Can, Ferit; Doğan, Gamze; Konca, Cemile; AKBULUT, AKHAN; BAYDOĞMUŞ, GÖZDE KARATAŞ; 110942; 116056Unlike traditional web applications, cloud-based applications can provide services for large number of tenants using the same hardware and software by implementing multi-tenant architectures. 407 papers have been examined by using systematic mapping method to evaluate the publications related to this architecture, which have been used increasingly in the Software-as-a-Service (SaaS) model. The goal of the study is to determine which storage strategies were used most, which criteria were taken into account in selecting the preferred storage strategy, and the most searched topics under multi-tenant architecture model. Primary researches which are conforming to specified review rules have been obtained from electronic databases (IEEE, ACM, Springer, ScienceDirect, Wiley, Scopus) and classified by research topic and content.Publication Embargo Survey on Access Control Mechanisms in Cloud Computing(River Publishers, 2018-05-26) AKBULUT, AKHAN; BAYDOĞMUŞ, GÖZDE KARATAŞ; 110942; 116056The benefits that Internet-based applications and services have given to the end user with today’s cloud computing technology are very remarkable. The distributed services instantly scaled over the Internet provided by cloud computing can be achieved by using some mechanisms in the background. It is a critical task for end users to control access to resources because lack of control often leads to security risks. In addition, this may cause systems to fail. This paper describes seven different access control mechanisms used in cloud computing platforms for different purposes. Besides, the advantages and disadvantages of various models developed from previous service-based architectures and used for cloud computing are detailed and classified. During the assessments, NIST’s metrics were taken as a reference, and in the study, 109 articles from the past decade were examined. We also compared our research with the existing survey papers.