Nazar K. Khorsheed, Mohammad A. El-Dosuky, Taher T. Hamza, M. Z. Rashad
{"title":"Data Security Evaluation Based on Trend Line Rules Model","authors":"Nazar K. Khorsheed, Mohammad A. El-Dosuky, Taher T. Hamza, M. Z. Rashad","doi":"10.21608/mjcis.2017.311960","DOIUrl":null,"url":null,"abstract":"With the rise in demand for cloud services, most companies attempt to provide a lot of cloud services and benefit from them, one of the most important services is accounting the cost of data ciphering in the clouds market. This proposed work proved that the cryptographic keys are variable as evident mathematically, which in turn makes it difficult to guess the decoding of the data, and extends the cloud security model by generating both private and public keys based on local cost and trend line rules respectively. Due to the increased decoding time as evident from the proof results, the suitable security level is implemented and tested using Symmetric and Asymmetric encryption algorithms.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mansoura Journal for Computer and Information Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/mjcis.2017.311960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the rise in demand for cloud services, most companies attempt to provide a lot of cloud services and benefit from them, one of the most important services is accounting the cost of data ciphering in the clouds market. This proposed work proved that the cryptographic keys are variable as evident mathematically, which in turn makes it difficult to guess the decoding of the data, and extends the cloud security model by generating both private and public keys based on local cost and trend line rules respectively. Due to the increased decoding time as evident from the proof results, the suitable security level is implemented and tested using Symmetric and Asymmetric encryption algorithms.