Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe study presents the modification of the Broyden-Flecher-Goldfarb-Shanno (BFGS) update (H-Version) based on the determinant property of inverse of Hessian matrix (second derivative of the objective function), via updating of the vector s ( the difference between the next solution and the current solution), such that the determinant of the next inverse of Hessian matrix is equal to the determinant of the current inverse of Hessian matrix at every iteration. Moreover, the sequence of inverse of Hessian matrix generated by the method would never approach a near-singular matrix, such that the program would never break before the minimum value of the objective function is obtained. Moreover, the new modification of BFGS update (H-vers
... Show MoreThe weather of Iraq has longer summer season compared with other countries. The ambient temperature during this season reaches over 50 OC which makes the evaporative cooling system suitable for this climate. In present work, the two-stage evaporative cooling system is studied. The first stage is indirect evaporative cooling (IEC) represented by two heat exchangers with the groundwater flow rate (5 L/min). The second stage is direct evaporative cooling (DEC) which represents three pads with groundwater flow rates of (4.5 L/min). The experimental work was conducted in July, August, September, and October in Baghdad. Results showed that overall evaporative efficiency of the system (two coils with three pads each
... Show MoreModern education incorporates strong elements of collaborative learning: activities that prompt students to collaborate on completing learning tasks. In this work we investigate the relationship between media type and student collaboration and attribution patterns during collaborative content creation. We run similarity analyses on text and video artifacts submitted by students as part of collaborative exercises in an undergraduate module. Our main finding is that the same cohort of students was significantly more likely to attribute non-original content to its sources when authoring text compared to video content and when this content is not produced by a peer student. Our preliminary results based on only two media suggest that media type
... Show MoreFiled experiment was conducted to test the effect of saline water and potassium fertilizers rate on proline and water potential of Pisum sativum L. (Var.Senador Cambados ) leaves . Treatments of the experiment included two levels of water salinity( 2, 7 dSm-1) as a main plot and fertilizer rates as a sub plot. Results indicated that irrigation of plant with saline water 7 dSm-1 and fertilization 150 kg/donum increased proline accumulation and water potential 0.31 mmol/g,-17.00 bar at 9 AM morning and 0.62 mmol/g , -21.00 bar at 3 PM afternoon ,Irrigating plant with a 2 dSm-1 and fertilization 300 kg/donum decreased proline accumulation and water potential of leaves 0.22 mmol/g, -16.00 bar at 9 A
... Show MoreThe present work presents design and implementation of an automated two-axis solar tracking system using local materials with minimum cost, light weight and reliable structure. The tracking system consists of two parts, mechanical units (fixed and moving parts) and control units (four LDR sensors and Arduino UNO microcontroller to control two DC servomotors). The tracking system was fitted and assembled together with a parabolic trough solar concentrator (PTSC) system to move it according to information come from the sensors so as to keep the PTSC always perpendicular to sun rays. The experimental tests have been done on the PTSC system to investigate its thermal performance in two cases, with tracking system (case 1) and without trackin
... Show MoreDiabetic mellitus is one of the main risk factors of fungal infections because poor glycemic control is associated with a high level of glucose in blood and saliva which could be treated as nutrient to fungi. This study aimed to isolate and identification of pathogenic fungi from diabetic patient. 140 samples were taken from different places of human body from the national center of diabetic patients that related to Mustansiriyah University / college of medicine and Al-yarmuk Hospital in Baghdad. 84 sample (60%) tested positive to fungi and 56 sample (40%) tested negative to fungi. The most frequented fungi isolated have been chosen for molecular identification by PCR (Millerozyma farinosa and Candida orthopsilosis) using specific pri
... Show More