Preferred Language
Articles
/
RxcXro0BVTCNdQwC3xi7
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 05 2018
Journal Name
College Of Education For Pure Science Ibn-a L-haitham, University Of Baghdad
On Some New Topological Spaces
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
International Society For The Study Of Vernacular Settlements
Evaluation of Sustainability Using LEED Rating Scales: The Bismayah New City in Baghdad, Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
New Versions of Liu-type Estimator in Weighted and non-weighted Mixed Regression Model
...Show More Authors

This paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
External Morphology of Neophilaenus lineatus(Linnaeus 1758) (Homoptera: Cercopidae) in Iraq New Record Species
...Show More Authors

The work included external morphological study of the frog hopperNeophilaenuslineatus(Linnaeus), 1758 which belongs to the family Cercopidae of order Homoptera. The studied species is regarded as new record to Iraqi funa. The study involved with the most important toxonomic external characters such as the head, thorax, abdomen and some of their appendages in addition to male and female genitalia

View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORD OF THE PARASITOID WASP MONODONTOMERUS OBSCURUS WESTWOOD, 1833 (HYMENOPTERA, TORYMIDAE) IN IRAQ
...Show More Authors

    This article reveals the first record of the parasitoid wasp, Monodontomerus obscurus Westwood (Hymenoptera, Torymidae) from Iraq.  A total of 27 specimens were emerged from mud nests of sphecoid wasp of Sceliphron sp. (Hymenoptera, Sphecidae), that collected from a wall at a residential garden in Dohuk province.  A short morphological description is presented.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More