Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the
... Show MoreAbstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreThe importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreNations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to wor
... Show MoreThe impact of Jurisprudence Rules in Addressing Contemporary security Challenges
Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre
... Show MoreTwo simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using Trtion X-114 as surfactant. Beer
... Show More