Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
The approach of deliberation in the ontemporary Iraqi theater text - theatricality Afwah-as a odel
...Show More Authors

The deliberative system of communicative studies is exposed to cultural openness, according to modern cultural studies, to establish a verbal language system that achieves reciprocal and cross-cultural relations. This research has examined the concept of deliberative approach in the contemporary Iraqi theater text by studying the deliberative system of text and its interrelationship with The stage of the verbal embodiment of the dramatic event, because the dramatic text achieves in its construction of racism, a deliberative approach between the verbal event and the language, and what later leads to the completion of the dramatic action. The research included four chapters. The first chapter was the systematic framework of the research, T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

Research summary

Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.

Islam laid down moral principles in war, including:

- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.

- Not to be exposed to non-combatants, including women, boys, the elderly, the disa

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The use of water resources in light of the challenges of water security in Iraq
...Show More Authors

Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall.  This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Pioneering and Growth of Plastic vision data in Modern Art
...Show More Authors

The achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they includ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Nov 03 2014
Journal Name
Iraqi Journal Of Physics
STVI calculating the changes in vegetable cover for a vegetated environment in west Iraq
...Show More Authors

Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
STVI calculating the changes in vegetable cover for a vegetated environment in west Iraq
...Show More Authors

Remote sensing provide the best means to monitoring change in vegetation over a wide range of temporal scales over large areas. In this study, the vegetation index which has been applied known as the Stress Related Vegetation Index (STVI) on in the area around the Euphrates River and part of Al-Habbaniyah lake which located at western side of the river in Ramadi city, Al-Anbar province at Iraq to study the vegetation cover changes and detect the areas of changes, using two satellite sensors multispectral images such as TM and ALI, after geometric correction procedure to rectifying these images. The STVI-4 index result was the best than other vegetation indices (STVI-1 and STVI-3) to discriminate the vegetable cover distribution. The diff

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication