Securing cloud data system (SCDS) for key exposure using AES algorithm
Nowadays the internet communication playing the imperative role that used to transfer large amount of cloud data in various fields and website applications. In the internet the cloud date and files for the websites transmitted through insecure channel from the sender to the receiver. In the transfer...
| Main Author: | Thabet Albatol, Mohammed Samer Hasan |
|---|---|
| Format: | Dissertation |
| Language: | English English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/6993/ |
| Abstract | Abstract here |
Similar Items
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
by: Hassan, Nor Hafeizah
Published: (2018)
by: Hassan, Nor Hafeizah
Published: (2018)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
An analysis of a private-key cryptosystem / by Tan Wei-Wey.
by: Tan, Wei-Wey
Published: (2002)
by: Tan, Wei-Wey
Published: (2002)
An integrated model for continuance use of cloud computing services towards SMEs organizational performance
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
Improved cuckoo search based neural network learning algorithms for data classification
by: Abdullah, Abdullah
Published: (2014)
by: Abdullah, Abdullah
Published: (2014)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
Tasks and User Performance Improvement for UUM Online Payment Using Key Stroke Level Model
by: Al-tawalbeh, Manal Ata
Published: (2009)
by: Al-tawalbeh, Manal Ata
Published: (2009)
Multi-Tap Mobile Phone Text Entry : Key-Press Operators For Keystroke Level Model
by: Srour, Ayman I. H.
Published: (2008)
by: Srour, Ayman I. H.
Published: (2008)
Data Mining Classification Techniques and Performances on Medical Data
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
Factors affecting the adoption of cloud computing by smes in Sabah
by: Chin, Fook Ming
Published: (2019)
by: Chin, Fook Ming
Published: (2019)
A semantic interoperability framework for software as a service systems in cloud computing environments / Reza Rezaei
by: Reza, Rezaei
Published: (2014)
by: Reza, Rezaei
Published: (2014)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
by: Mohammed, Khudair Abbas
Published: (2019)
by: Mohammed, Khudair Abbas
Published: (2019)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
Optimization grid scheduling with priority base and bees algorithm
by: Ahmed, Mohammed Shihab
Published: (2014)
by: Ahmed, Mohammed Shihab
Published: (2014)
A novel algorithm : apriori-ant. The combination of apriori algorithm and ants colony optimization algorithm
by: Choo, Ai Ling
Published: (2005)
by: Choo, Ai Ling
Published: (2005)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Optimized feature construction methods for data summarization methods for data summarization of relational data
by: Florence Sia, Fui Sze
Published: (2014)
by: Florence Sia, Fui Sze
Published: (2014)
Analyzing Primary Student Data Using Data Mining
by: Chong, Sze Wei
Published: (2009)
by: Chong, Sze Wei
Published: (2009)
Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
by: Qi, Han
Published: (2016)
by: Qi, Han
Published: (2016)
Multi-document text summarization using text clustering for Arabic Language
by: Waheeb, Samer Abdulateef
Published: (2014)
by: Waheeb, Samer Abdulateef
Published: (2014)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
Data Compression For Multimedia Computing
by: Mohd Tarmizi, Musa
Published: (1995)
by: Mohd Tarmizi, Musa
Published: (1995)
Stemming Algorithm in Searching Malay Text
by: Rizauddin, Saian
Published: (2004)
by: Rizauddin, Saian
Published: (2004)
Similar Items
-
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024) -
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024) -
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018) -
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007) -
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
