Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show MoreToday’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati
... Show MoreThis research studies the Saudi women participation in the visual arts, presents descriptive and analytical overview on their artworks and assess development through their participation in the said exhibition, frequency of participation, and aims to understand the most important stages and changes of the subjects addressed, artistic styles and the factors affecting these results in view of female artist's attitude pertaining to several aspects such as administrative organization, judging committees etc.
Interviews were held with a sample of female artists, 17 artists from different regions and generations out of 182 participants and reviewed relevant exhibition literature during the period 1979-2018. The research problem is to id
... Show MoreThe centers of cities and historical quarter are exposed to a severe threat to the values of the physical and legal urban environment as a result of the value deterioration and the emergence, emergence and spread of new values on the intellectual and urban context, which generates the loss of the urban environment for its spatio-temporal continuity, flexibility, adaptation and continuity, and thus urban obsolescence, Hence the problem of the research in “the lack of comprehensiveness of studies on the phenomenon of urban obsolescence and its impact on the decline in the values of the quality of the built environment in historic
... Show MoreFutsal and blind football are group games of a competitive nature due to their excitement, excitement, fun, and aesthetic goals with charming artistic touches. This explains the public's passion for these two games, whether healthy people or blind people play them, to expand their vision and knowledge. About these two games, a historical approach is presented about their origins, development, and how they became globally recognized competitive sports with unified rules and world championships at various levels. Studying the origin and global spread of both futsal and blind football and identifying the most prominent developments in the rules and tools for futsal and blind football. The most important findings were that both futsal and footb
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreHigh vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination
... Show More