Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreAbstract:
The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.
A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of
... Show MoreThe study seeks to determine the levels of credit structure (independent variable) depending on its components (loans, credit disseminate, other facilities) To get the eight patterns of the structure of bank credit for the purpose of assessing the relationship between changes in levels of each style of structure credit (increase or decrease) and reflected in maximizing the value of the Bank(The adopted a measured variable depending on the approximate equation of simple Tobin's Q) to determine the style that achieves the highest value of the Bank, to take advantage of it in management, planning and control by knowing the strengths and weaknesses of the historical distribution of the facilities . the sample of the
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThe aim of the research is to measure the relationship and effect of the application of total production maintenance TPM in the operational strategy, as it is considered one of the most important strategies for the process of restoring production losses because of inefficient equipment. Competitive edge in the global market by upgrading the operational strategies of OS in the application of TPM in those institutions that apply both H-OS-oriented and P-OS-oriented strategies where the strategy has been identified as a critical success factor. The aim of this study is to attempt to consider the application of comprehensive productive maintenance in industrial establishments
The research aims to find out the impact of wages and benefits systems on the performance of employees, which included the research community on a sample of employees in the company, and the sample consisted of (50) employees and an employee, A questionnaire composed as prepared (23) paragraph, use the promised statistically methods in data collected by the questionnaire analysis. The research reached a number of results, the most prominent of which were: There is a correlation between wage systems, benefits and performance of employees, and the presence of the impact of the systems of wages and benefits to the performance of employees. The research was presented a set of recommendations including: increasing the effectiveness of
... Show More