Abstract
Network Security in Cloud-Based Digital Music Classrooms (NS-CDMC) is a novel architecture that secures critical educational environments. RBAC, fine-grained ABE, dynamic TBAR, secure session creation, data integrity verification, and proactive anomaly-based intrusion detection are used in NS-CDMC. The NS-CDMC model has demonstrated superior performance across critical security metrics compared to several benchmark methods. Key results include an Anomaly Detection Rate (ADR) of 0.96, outperforming other methods and indicating the model’s ability to detect sophisticated threats and insider misuse. The model handles access requests efficiently with an Access Control Decision Latency of 48 ms, comparable to or lower than other benchmark techniques. Additionally, the NS-CDMC model has a substantially lower False Positive Rate (FPR) of 0.03, minimizing unnecessary interruptions and improving operational smoothness in digital music classrooms. Simulations for the NS-CDMC model captured access choices, trust score changes, anomaly scores, and Attribute-Based Encryption (ABE) policy applications. The NS-CDMC security framework provides a secure, real-time, and user-friendly environment for digital music classrooms using ABE, Trust-Based Access Refinement (TBAR), and anomaly detection. ABE restricts content decryption to authorized users based on roles, courses, and instruments. TBAR dynamically adjusts access control based on user trust scores, which reflect behavior in the system.
References
P. Gupta, R. Mahajan, U. Badhera, P.S. Kushwaha, Integrating generative AI in management education: a mixed-methods study using social construction of technology theory, Int. J. Manag. Educ., 22(3) (2024), Article 101017.
Chen, Z. 2024. Campus Network Security Intrusion Detection Based on Feature Segmentation and Deep Learning. Journal of Cyber Security and Mobility. 13, 04 (Jun. 2024), 775–802. https://doi.org/10.13052/jcsm2245-1439.1349.
E. Balamurugan, A. Mehbodniya, E. Kariri, K. Yadav, A. Kumar, M. Anul Haq, Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN), Pattern Recognit. Lett., 156 (2022), pp. 142–151.
M. Wang, Optimization of network security in university laboratories based on anomaly intrusion detection in public cloud networks Comput. Electr. Eng., 111 (2023), Article 108968.
N. Basil, H.M. Marhoon, Selection and evaluation of FOPID criteria for the X-15 adaptive flight control system (AFCS) via Lyapunov candidates: optimizing trade-offs and critical values using optimization algorithms, e Prime Adv. Electr. Eng. Electron. Energy, 8 (2024), article 100589.
N. Basil, H.M. Marhoon, A.F. Mohammed, Evaluation of a 3-DOF helicopter dynamic control model using FOPID controller-based three optimization algorithms, Int. J. Inf. Technol. (2024), pp. 1–10.
N. Basil, B.M. Sabbar, H.M. Marhoon, A.F. Mohammed, A. Ma’arif, Systematic review of unmanned aerial vehicles control: challenges, solutions, and meta-heuristic optimization, Int. J. Robot. Control Syst., 4(4) (2024).
L.C. Costa, et al., OpenFlow data planes performance evaluation, Perform. Eval., 147 (2021), Article 102194.
A.R. Ibrahim, N. Basil, M.I. Mahdi, Implementation enhancement of AVR control system within optimization techniques, Int. J. Nonlinear Anal. Appl., 12(2) (2021).
H.M. Marhoon, N. Basil, A. Ma’arif, Exploring blockchain data analysis and its communications architecture: achievements, challenges, and future directions: a review article, Int. J. Robot. Control Syst., 3(3) (2023), pp. 609–626.
H.M. Marhoon, N. Basil, A.F. Mohammed, Medical Defense Nanorobots (MDNRs): a new evaluation and selection of controller criteria for improved disease diagnosis and patient safety using NARMA (L2)-FOP+ D (ANFIS) μ
–Iλ
-based Archimedes Optimization Algorithm, Int. J. Inf. Technol. (2024), pp. 1–11.
M. Erel-Özçevik, Sustainable fixed wireless access with blockchain secured software defined network, Pervasive Mob. Comput., 92 (2023), Article 101803.
N. Indrason, G. Saha, Exploring Blockchain-driven security in SDN-based IoT networks, J. Netw. Comput. Appl., 224 (2024), Article 103838.
R. Iqbal, R. Hussain, S. Arif, N.M. Ansari, T.A. Shaikh, Data analysis of network parameters for secure implementations of SDN-based firewall, Comput. Mater. Contin., 77(2) (2023), pp. 1575–1598.
Debnath S, Ganguly N, Mitra P (2008) Feature weighting in content based recommendation system using social network analysis[C]//Proceedings of the 17th international conference on World Wide Web. 1041–1042.
Bagul DV, Barve S (2021) A novel content-based recommendation approach based on LDA topic modeling for literature recommendation[C]//2021 6th International conference on inventive computation technologies (ICICT). IEEE: 954–961.
He X, Liao L, Zhang H et al. (2017) Neural collaborative filtering[C]//Proceedings of the 26th international conference on world wide web. 173–182.
Chen T, He X, Kan MY (2016) Context-aware image tweet modelling and recommendation. Proceedings of the 24th ACM international conference on Multimedia, pp. 1018–1027. https://doi.org/10.1145/2964284.2964291.
Selmene S, Kodia Z (2020) Recommender System Based on User’s Tweets Sentiment Analysis. Proceedings of the 4th International Conference on E-Commerce, E-Business and E-Government, pp. 96–102. https://doi.org/10.1145/3409929.3414744.
Sánchez-Moreno D, Zheng Y, Moreno-García MN (2018) Incorporating time dynamics and implicit feedback into music recommender systems. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (WI), Santiago, Chile, pp. 580–585. https://doi.org/10.1109/WI.2018.00-34.
Kayes, A.S.M.; Kalaria, R.; Sarker, I.H.; Islam, M.S.; Watters, P.A.; Ng, A.; Hammoudeh, M.; Badsha, S.; Kumara, I. A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors 2020, 20, 2464. https://doi.org/10.3390/s20092464.
L. Zhang, H. Li, Y. Zhang and F. Khan, “Efficient privacy-preserving decentralized ABE supporting expressive access structures,” 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 2017, pp. 547–552, doi: 10.1109/INFCOMW.2017.8116436.
Schummer, P.; del Rio, A.; Serrano, J.; Jimenez, D.; Sánchez, G.; Llorente, Á. Machine Learning-Based Network Anomaly Detection: Design, Implementation, and Evaluation. AI 2024, 5, 2967–2983. https://doi.org/10.3390/ai5040143.
Ogwara, N.O.; Petrova, K.; Yang, M.L.; MacDonell, S.G. MINDPRES: A Hybrid Prototype System for Comprehensive Data Protection in the User Layer of the Mobile Cloud. Sensors 2025, 25, 670. https://doi.org/10.3390/s25030670.
Fan W, Derr T, Ma Y et al. (2019) Deep adversarial social recommendation. arXiv preprint arXiv:1905.13160.
Zheng E, Kondo GY, Zilora S et al. (2018) Tag-aware dynamic music recommendation. Expert Syst Appl 106:244–251
Hu Y, Koren Y, Volinsky C (2008) Collaborative filtering for implicit feedback datasets[C]//2008 Eighth IEEE international conference on data mining. IEEE 15:263–272.
Liu CL, Chen YC (2018) Background music recommendation based on latent factors and moods. Knowl Based Syst 159:158–170.
Li T, Choi M, Fu K et al. (2019) Music sequence prediction with mixture hidden markov models[C]//2019 IEEE International Conference on Big Data (Big Data). IEEE: 6128–6132.
Flexer A, Stevens J (2018) Mutual proximity graphs for improved reachability in music recommendation. J new Music Res 47(1):17–28.
Choi S, Ha H, Hwang U et al. (2018) Reinforcement learning based recommender system using biclustering technique. arXiv preprint arXiv:1801.05532

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
