Preferred Language
Articles
/
RxcXro0BVTCNdQwC3xi7
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files. More specifically, an attacker who knows the hash signature of a file can convince the storage service that he/she owns that file, hence the server lets the attacker to download the entire file. To overcome such attacks,the hash signature is encrypted with the user password. As a proof of concept a prototype of the proposed authorized deduplicate is implemented and conducted the test bed experiments using the prototype. Performance measurements indicate that the proposed Deduplication system incurs minimal overhead in the context of uploading, bandwidth compared to native deduplication.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Engineering Science And Technology, An International Journal
Thermal performance improvement based on the hybrid design of a heat sink
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Detection of Single Nucleotide Polymorphisms (SNPs) for Genes Cause Drug-Resistant in Iraqi Mycobacterium Tuberculosis isolates by new Pyrophosphate Technique.
...Show More Authors

In this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP

... Show More
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Al-nahrain University
Corrosion Inhibition Effects of Some New Synthesized N-Aroyl-N\ -Aryl thiourea Derivatives for Carbon Steel in Sulfuric Acid Media
...Show More Authors

This research includes the synthesis of some new N-Aroyl-N \ -Aryl thiourea derivatives namely: N-benzoyl-N \ -(p-aminophenyl) thiourea (STU1), N-benzoyl-N \ -(thiazole) thiourea (STU2), N-acetyl-N ` -(dibenzyl) thiourea (STU3). The series substituted thiourea derivatives were prepared from reaction of acids with thionyl chloride then treating the resulted with potassium thiocyanate to affored the corresponding N-Aroyl isothiocyanates which direct reaction with primary and secondary aryl amines, The purity of the synthesized compounds were checked by measuring the melting point and Thin Layer Chromatography (TLC) and their structure, were identified by spectral methods [FTIR,1H-NMR and 13C-NMR].These compounds were investigated as a

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Geological Journal
Structural Interpretation of Yamama and Naokelekan Formations in Tuba Oil Field Using 2D Seismic Data
...Show More Authors

This research includes structure interpretation of the Yamama Formation (Lower Cretaceous) and the Naokelekan Formation (Jurassic) using 2D seismic reflection data of the Tuba oil field region, Basrah, southern Iraq. The two reflectors (Yamama and Naokelekan) were defined and picked as peak and tough depending on the 2D seismic reflection interpretation process, based on the synthetic seismogram and well log data. In order to obtain structural settings, these horizons were followed over all the regions. Two-way travel-time maps, depth maps, and velocity maps have been produced for top Yamama and top Naokelekan formations. The study concluded that certain longitudinal enclosures reflect anticlines in the east and west of the study ar

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the Implementation gap of Operational requirement according to the international standard (ISO 9001:2015) in the National Insurance Company : Applied research.
...Show More Authors

The aim of the research is to diagnose and analyze the gap between the actual reality and the application of the eighth requirement (operation) in the National Insurance Company in accordance with the international standard specification for the quality management system (ISO 9001:2015), which is related to the planning, implementation and control of operations, which would raise the level of performance of employees and be reflected in the provision of An appropriate service for the faithful, as the reality of the condition of the requirement was studied by identifying the strengths and weaknesses of the system to diagnose the gap and find ways to address it. A workshop was held with company officials, through which questions were raise

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The new aesthetic in contemporary world painting
...Show More Authors

The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Computer Science
Peer-to-Peer Video Conferencing Using Hybrid Content Distribution Model
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
Journal Of Nuclear Medicine
A hand-held hybrid gamma-near-infrared fluorescence imaging camera
...Show More Authors

Objectives: Recently, there have been important advances in the clinical application of targeted hybrid near-infrared (NIR) fluorescent-radioactive tracers. ICG-99mTc-nanocolloid, for example, is already being used by some centres for sentinel lymph node biopsy in head and neck cancer. The radioactive component allows imaging at depths which would not be possible with NIR alone and, once exposed, the NIR fluorescence reporter can be imaged at very high resolution. Gamma detection is currently carried out with a separate hand-held gamma camera or with a non-imaging probe. Visualisation of NIR fluorescence during surgery requires a dedicated NIR camera, several of which are available commercially. We describe a novel hand-held hybrid NIR-gamm

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus