Preferred Language
Articles
/
bsj-7077
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Tue Jul 04 2023
Journal Name
Qalaai Zanist Scientific Journal
The Role of The Environmental Observer and The Environmental Police in Protecting the Environment in Iraqi Law
...Show More Authors

View Publication
Crossref
Publication Date
Mon Dec 24 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MINERALOGY AND GEOCHEMISTRY OF CORAL REEF IN IRAQI MARINE ENVIRONMENT IN THE NORTH PART OF ARABIAN GULF
...Show More Authors

    Coral reef area in northwest of the Arabian Gulf was investigated for mineralogy and geochemistry to throw lights on such unique Iraqi Marine Environment; six specimens of two main species of coral reefs, Platygyra pini Chevalier, 1975 and Octocoral Menella were collected at two sites. While eight samples of the surrounding sediments are chosen from other two sites. The mineralogy is determined by XRD, and reveals that calcite, low magnesium-calcite, and aragonite are the main minerals that comprise the Octocoral Menella in site 1, whilst aragonite and calcite are dominate in the P. pini coral reef at site 4.

    The non–carbonate fractions indicate that thes

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 26 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 DESTRUCTION OF EXPIRED DRUGS TO ADDRESS ENVIRONMENT-FRIENDLY: DESTRUCTION OF EXPIRED DRUGS TO ADDRESS ENVIRONMENT-FRIENDLY
...Show More Authors

The method of incineration was chosen to treat the most commonly used antimicrobial agents in Iraq (Triclabendazol, Oxfendazol, Mebendazole), which are antibiotics for children. The moisture content and chemical oxygen demand (COD) were examined and the results were (93.34, 94.88, 92.97)%, (52000, 33200, and 64000) mg/ L. The temperature was determined as a variable in the burning process (600, 500, 400)° C for the purpose of calculating the loss of ignition LOI and determining the ideal temperature. The results of the models (Triclabendazol, Oxfendazol, Mebendazole) (94.92, 93.12, 58.81% and 88.87), (62.61, 44.08%, 98.75, 84.98 and 55.086)% respectively. When mixing the three models in equal proportions, the percentage of loss was 92.8

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 08 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Implementation of RWP and Gauss Markov Mobility Model for Multi-UAV Networks in Search and Rescue Environment
...Show More Authors

Future generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms.  In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Geological Journal
Sequence Stratigraphy and Depositional Environment of the Zubair Formation in Rumaila Oilfields, Southern Iraq: Microfacies and Geochemistry
...Show More Authors

In the Rumaila oilfields in southern Iraq, the Zubair Formation was deposited in a shallow environment as three main facies, delta plain, backshore, and delta front depositional conditions indicating a transition from delta front and delta plain to a highstand level due to the finning upward mode. The facies of the Zubair clasts show well-sorted quartz arenite sandstone, poorly sorted quartz arenite sandstone, clayey sandstone that has not been properly sorted, sandy shale, and shale lithofacies. The minor lithofacies were identified using well-logging methods (gamma ray, spontaneous potential and sonic logs) and petrography. The Zubair clasts are of transition environment that appears to be transported from freshwater and deposited

... Show More
View Publication Preview PDF
Crossref (3)
Crossref