Securing cloud data system (SCDS) for key exposure using AES algorithm
Nowadays the internet communication playing the imperative role that used to transfer large amount of cloud data in various fields and website applications. In the internet the cloud date and files for the websites transmitted through insecure channel from the sender to the receiver. In the transfer...
| Main Author: | Thabet Albatol, Mohammed Samer Hasan |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/6993/ |
| Abstract | Abstract here |
Similar Items
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
An analysis of a private-key cryptosystem / by Tan Wei-Wey.
by: Tan, Wei-Wey
Published: (2002)
by: Tan, Wei-Wey
Published: (2002)
An integrated model for continuance use of cloud computing services towards SMEs organizational performance
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Improved cuckoo search based neural network learning algorithms for data classification
by: Abdullah, Abdullah
Published: (2014)
by: Abdullah, Abdullah
Published: (2014)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
Multi-Tap Mobile Phone Text Entry : Key-Press Operators For Keystroke Level Model
by: Srour, Ayman I. H.
Published: (2008)
by: Srour, Ayman I. H.
Published: (2008)
Tasks and User Performance Improvement for UUM Online Payment Using Key Stroke Level Model
by: Al-tawalbeh, Manal Ata
Published: (2009)
by: Al-tawalbeh, Manal Ata
Published: (2009)
Data Mining Classification Techniques and Performances on Medical Data
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
Factors affecting the adoption of cloud computing by smes in Sabah
by: Chin, Fook Ming
Published: (2019)
by: Chin, Fook Ming
Published: (2019)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
by: Mohammed, Khudair Abbas
Published: (2019)
by: Mohammed, Khudair Abbas
Published: (2019)
A semantic interoperability framework for software as a service systems in cloud computing environments / Reza Rezaei
by: Reza, Rezaei
Published: (2014)
by: Reza, Rezaei
Published: (2014)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Optimization grid scheduling with priority base and bees algorithm
by: Ahmed, Mohammed Shihab
Published: (2014)
by: Ahmed, Mohammed Shihab
Published: (2014)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
by: Qi, Han
Published: (2016)
by: Qi, Han
Published: (2016)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Optimized feature construction methods for data summarization methods for data summarization of relational data
by: Florence Sia, Fui Sze
Published: (2014)
by: Florence Sia, Fui Sze
Published: (2014)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Analyzing Primary Student Data Using Data Mining
by: Chong, Sze Wei
Published: (2009)
by: Chong, Sze Wei
Published: (2009)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Multi-document text summarization using text clustering for Arabic Language
by: Waheeb, Samer Abdulateef
Published: (2014)
by: Waheeb, Samer Abdulateef
Published: (2014)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Data Compression For Multimedia Computing
by: Mohd Tarmizi, Musa
Published: (1995)
by: Mohd Tarmizi, Musa
Published: (1995)
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
Similar Items
-
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024) -
Securing Cloud Storage Using Aes Based On Geo-Key Method
by: Nur Syafiqah binti Mohd Shamsuddin
Published: (2024) -
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007) -
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018) -
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)