In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
We dealt with the nature of the points under the influence of periodic function chaotic functions associated functions chaotic and sufficient conditions to be a very chaotic functions Palace
We introduce some new generalizations of some definitions which are, supra closure converge to a point, supra closure directed toward a set, almost supra converges to a set, almost supra cluster point, a set supra H-closed relative, supra closure continuous functions, supra weakly continuous functions, supra compact functions, supra rigid a set, almost supra closed functions and supra perfect functions. And we state and prove several results concerning it
The research aims to focus on the human rights guarantees as they are subjected to continuous violations due to changes, wars and conflicts between nations and people, especially in the Arab world and the third world due to political, social, economic and environmental conditions and the failure of democratic tracks under the current reality.
Keyword: Human rights, Reality, Ambition.
the Reception and the Creative Reaction
Melatonin, a hormone synthesized mainly by the pineal gland, has been found in extra-pineal organs as well. It’s known as an organizer of circadian rhythms and more recently as an anti-oxidant. In addition to its role in maintaining immunity, pathophysiology of cardiovascular and neurological diseases, and as an anti-cancer agent, evidence has demonstrated that melatonin exerts a positive impact on male and female fertility primarily through oxygen scavenging effects. In In Vitro Fertilization (IVF) programs, supplementation of melatonin may be associated with better outcomes in terms of sperm quality, oocyte quality, embryo quality and pregnancy rates. This review summarizes various actions of melatonin on the body focusing on ma
... Show More