Preferred Language
Articles
/
ijs-8117
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
ZnO: MWCNT optical hybrid filter a promising nanomaterial for wastewater treatment and antimicrobial applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Modeling and Simulation for Performance Evaluation of Optical Quantum Channels in Quantum key Distribution Systems
...Show More Authors

In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Dec 16 2021
Journal Name
Translational Vision Science & Technology
A Hybrid Deep Learning Construct for Detecting Keratoconus From Corneal Maps
...Show More Authors

View Publication
Scopus (25)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2015
Journal Name
. International Journal Of Computer Science And Mobile Computing
A Hybrid Lossy Image Compression based on Wavelet Transform, Polynomial Approximation Model, Bit Plane Slicing and Absolute Moment Block Truncation
...Show More Authors

Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
IoT-Key Agreement Protocol Based on The Lowest Work-Load Versions of The Elliptic Curve Diffie-Hellman
...Show More Authors

     A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 24 2009
Journal Name
Proceeding Of 3rd Scientific Conference Of The College Of Science, University Of Baghdad.
A Comparison Between Galactic and Large Magellanic Cloud (LMC) Interstellar Extinction Curves
...Show More Authors

Average interstellar extinction curves for Galaxy and Large Magellanic Cloud (LMC) over the range of wavelengths (1100 A0 – 3200 A0) were obtained from observations via IUE satellite. The two extinctions of our galaxy and LMC are normalized to Av=0 and E (B-V)=1, to meat standard criteria. It is found that the differences between the two extinction curves appeared obviously at the middle and far ultraviolet regions due to the presence of different populations of small grains, which have very little contribution at longer wavelengths. Using new IUE-Reduction techniques lead to more accurate result.

Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Cloud Computing Platform for Mentoring Trainees: The Case of the Professional Training of Midwives in Morocco
...Show More Authors

The digital transformation invites several solutions to optimize professional training. Its particularity lies in the management, conservation and securing of their data to each of the players. The use of the electronic learning booklet with Cloud computing aims to be simple and intuitive, it creates interaction and makes it possible to strengthen the links of the trinomial (Student, Educational tutor, supervisor on a training)
We thought of using a online platform tool using Cloud Computing Technology to overcome the limitations of the "paper" learning booklet. This technical-pedagogical system makes it possible to save all data of the apprentice through evaluation grids and follow-up sheets, both during training periods and in theor

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
E-Government Public Cloud Model (EGPCM)
...Show More Authors

   The concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a  new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
An Improve Image Encryption Algorithm Based on Multi-level of Chaotic Maps and Lagrange Interpolation
...Show More Authors

Currently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu

... Show More
View Publication Preview PDF