Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Autorías: Mustafa Abdulamir Hussain, Ahmed Sebeaatea Almujamay, Riyadh khaleel khammas. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.
Stable isotopes 18O/16O and 13C/12C in the carbonate rocks of the Mishrif Formation are examined here to define the depositional characters in the basin includes paleo temperatures and paleo depth. The Mishrif formation (Cenomanian – Early Turonian) has extensive distribution in Iraq and Middle East. Mishrif Formation composed of organic detrital limestone. Four boreholes in four oilfields, Noor – well (11), Amarah – well (14), Buzurgan – well (24), Halfaya – well (8), in south east of Iraq have been studied. The studied samples have negative δ18O isotope values studied well, with Average (-4.11‰), (-4.47‰), (-4.48‰), (-4.18‰) in the studied wells res
... Show MoreThe purpose of my thesis is to prepare four new ligands (L1-L4) that have been used to prepare a series of metal complexes by reacting them with metal ions: M=(Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II) Where succinyl chloride was used as a raw material for the preparation of bi-dented ligands (L1-L4) by reacting it with potassium thiocyanate as a first step and then reacting with (2-aminobenzothiazole, Benzylamine, 4-aminoantipyrine, Sulfamethoxazole) respectively as a second step with the use of dry acetone as a solvent, the chemical formula of the four ligands prepared in succession: N1,N4-bis(benzo[d]thiazol-2-ylcarbamothioyl)succinamide (L1) N1,N4-bis(benzylcarbamothioyl)succinami
... Show MoreThis study aimed to evaluate the effectiveness of a novel concrete-encased column (CE) using small circular steel tubes filled with cementitious grouting material (GFST) as the primary reinforcement instead of traditional steel bars. The research involved three different types of reinforcement: conventional steel bars, concrete-filled steel tubes with 30% of the reinforcement ratio of steel bars, and concrete-filled steel tubes with the same reinforcement ratio as steel bars. Twenty-four circular concrete columns were tested and categorized into six groups based on the type of reinforcement employed. Each group comprised four columns, with one subjected to concentric axial load, two subjected to eccentric axial load (with eccentrici
... Show MoreHerein, the interfacial polymerization method has been used for the synthesis of PPy/NaVO3 composites with different compositions of NaVO3 (10 %, 20 %, 30 %, 40 % and 50 %) as an efficient electrode material for supercapacitors. The successful formation and composition of the as-prepared composites (PV1-PV5) were confirmed by FTIR, XRD, EDX, and SEM analysis. The electrochemical properties were investigated by cyclic voltammetry (CV), galvanometric charge–discharge measurement (GCD), and electrochemical impedance spectroscopy (EIS) in 0.5 M H2SO4 electrolyte. As compared to other, the PV4 composite exhibit excellent specific capacitance of 391 F g−1 at a current density of 0.75 A/g with good cycling stability of ∼59 % after 1000 cycle
... Show MoreA theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were studied using potentiomet
... Show MoreSynthesis of 2-(4-Acetyl-phenyl)-4-nitro-isoindole-1, 3-dione chalcones were performed by fusion of 3-nitro phthalic anhydride with p-aminoacetophenone. Then the later was grinded with different aromatic aldehydes in the presence of sodium hydroxide to produce new chalcones derivatives A3-10 without using any solvent formation of new N- arylphthailimide chalcones were confirmed by FT-IR,1HNMR, 13CNMR spectroscopy and all final compounds were tested for their antifungal and antibacterial activity some of them showed more biological activity than the standard drugs