Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Oxazepine [1] is non – nomologous seven –member ring that contain two netroatoms (oxygen and nitrogen ). Meanwhile diazepine [2] contains to nitrogen atoms in seven – member ring.
Diazepam (valium) [3] is used to relive anxiety tension associated with anxiety disorder and muscle spasms (1, 2, 3
... Show More
Abstract:
The models of time series often suffer from the problem of the existence of outliers that accompany the data collection process for many reasons, their existence may have a significant impact on the estimation of the parameters of the studied model. Access to highly efficient estimators is one of the most important stages of statistical analysis, And it is therefore important to choose the appropriate methods to obtain good estimators. The aim of this research is to compare the ordinary estimators and the robust estimators of the estimation of the parameters of
... Show MoreA new Schiff base [1-((2-(1H-indol-3-yl)ethylimino)methyl)naphthalene-2-ol] (HL) has been synthesized by condensing (2-hydroxy-1-naphthaldehyde) with (2-(1H-indol-3-yl)ethylamine). In turn, its transition metal complexes were prepared having the general formula; [Pt(IV)Cl2(L)2], [Re(V)Cl2(L)2]Cl and [Pd(L)2], 2K[M(II)Cl2(L)2] where M(II) = Co, Ni, Cu] are reported. Ligand as well as metal complexes are characterized by spectroscopic techniques such as FT-IR, UV-visible, 13C & 1H NMR, mass, elemental analysis. The results suggested that the ligand behaves like a bidentate ligand for all the synthesized complexes. On the other hand, theoretical studies of the ligand as well its metal complexes were conducted at gas phase using Hyp
... Show MoreThe aim of this research is to identify the strengths and weaknesses of organizational health in the Iraqi Central Handball Federation from the point of view of those who manage the implementation of the annual curriculum, and adopt a descriptive approach in the method of studying the case. This is based on a sample of administrators of the Iraqi Handball Federation curriculum [trainers, governors, members, president, the 138 members of the Central Federation's Administrative Authority, the President, members of the sub-federations of the sports market (2021/2022) selected deliberately by 100% and then divided into statistical analysis sample (30), reconnaissance sample (10), and application sample (98)]. The regulatory health questionnaire
... Show More