Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.
Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe reaction of methyldopa with o-vanillin in refluxing ethanol afforded Schiff base and characterized through physical analysis with a number of spectra also the study of biological activity. The geometry of the Schiff base was identified through using (C.H.N) analysis, Mass, 1H-NMR, FT-IR, UV-Vis spectroscopy. Metal complexes of Cr3+, Mn2+, Co2+, Ni2+, Cu2+, Zn2+, Cd2+ and Hg2+ with Schiff base have been prepared in the molar ratio 2:1 (Metal:L), (L = Schiff base ligand) except Hg2+ at molar ratio 1:1 (Hg:L). The prepared complexes were characterized by using Mass, FT-IR and UV-Vis spectral studies, on other than magnetic properties and flame atomic absorption, conductivity measurements. According to the results a dinuclear octahedral geo
... Show MoreTHE Schiff base reaction played an important role of the condensation reaction between 2-aminophenol and Glyoxylic acid in the presence of calculated amounts of KOH as a catalyst. The reaction has been carried out in ethanol under reflux and stirring condition for 3.5 hrs. All syntheses were carried out under hydrogen gas forming a new potassium (E)-1-hydroxy-2-(2-hydroxyphenylimino)ethanolate ligand type [NO2]. The ligand of the general formula K2[Mn(L2)] type and its Mnп complex K2[Mn(N2O4)] type, has been characterized by spectroscopic methods (F.T-I.R. and U.V-Vis.), elemental analysis (C.H.N) metal content, magnetic susceptibility measurement, Thin-layer chromatography (T.L.C), X-RD powder diffraction, 1H-NMR, 13C-NMR molar conductanc
... Show MoreIn the present study, metal complexes of Mn(II), Ni(II), Co(II), Cu(II) and Hg(II) were synthesized using new Tetraazamacrocyclic Schiff Base (5E,8E,14E,17E)-6,8,15,17-tetramethyl-1,2,3,4,4a,7,9a,10,11,12,13,13a,16,18a-tetradecahydrodibenzo [b,i][1,4,8,11]tetraazacyclotetradecine (L) derived from 1,2-diamino cyclo hexane with the acetyl acetone. Compounds have been exanimated and confirmed by fourier-transform infrared (FT-IR), ultraviolet-visible (UV-visible), proton nuclear magnetic resonance (1HNMR), carbon nuclear magnetic resonance (13CNMR), microelemental analyses (CHN), thermal analysis (TG), conductivity and magnetic susceptibility. The propose geometry for all complexes [MLCl2] structures were octahedral. Therm
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreA series of Schiff bases linked to phthalimidyl phenyl sulfonate moiety have been synthesized via multistep synthesis. The first step involved reaction of phthalic anhydride with aniline producing N-phenyl phthalamic acid which was subsequently dehydrated to the corresponding N-phenyl phthalimide via treatment with acetic anhydride and anhydrous sodium acetate. The synthesized imide was treated with chlorosulfonic acid in the third step producing 4-(N-phthalimidyl) phenyl sulfonyl chloride which was introduced in reaction with 4-hydroxy acetophenone in the fourth step producing 4-[4-(N-phthalimidyl) phenyl sulfonate] acetophenone and this in turn was introduced successfully in condensation reaction with various aromatic primary amines affor
... Show MoreThe synthesis of new benzodiazepine, imidazole, isatin, maleimide, pyrimidine and 1,2,4-triazole derived from 2-amino-4-hydroxy-1,3,5-triazine, via its cyclocondensation reaction with different organic reagents, is described. FT-IR, 1H-NMR and as well as 13C-NMR spectra disclosed the structures of the precursors and heterocyclic derivatives formed.