Data Security Evaluation Based on Trend Line Rules Model

Nazar K. Khorsheed, Mohammad A. El-Dosuky, Taher T. Hamza, M. Z. Rashad
{"title":"Data Security Evaluation Based on Trend Line Rules Model","authors":"Nazar K. Khorsheed, Mohammad A. El-Dosuky, Taher T. Hamza, M. Z. Rashad","doi":"10.21608/mjcis.2017.311960","DOIUrl":null,"url":null,"abstract":"With the rise in demand for cloud services, most companies attempt to provide a lot of cloud services and benefit from them, one of the most important services is accounting the cost of data ciphering in the clouds market. This proposed work proved that the cryptographic keys are variable as evident mathematically, which in turn makes it difficult to guess the decoding of the data, and extends the cloud security model by generating both private and public keys based on local cost and trend line rules respectively. Due to the increased decoding time as evident from the proof results, the suitable security level is implemented and tested using Symmetric and Asymmetric encryption algorithms.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mansoura Journal for Computer and Information Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/mjcis.2017.311960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the rise in demand for cloud services, most companies attempt to provide a lot of cloud services and benefit from them, one of the most important services is accounting the cost of data ciphering in the clouds market. This proposed work proved that the cryptographic keys are variable as evident mathematically, which in turn makes it difficult to guess the decoding of the data, and extends the cloud security model by generating both private and public keys based on local cost and trend line rules respectively. Due to the increased decoding time as evident from the proof results, the suitable security level is implemented and tested using Symmetric and Asymmetric encryption algorithms.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于趋势线规则模型的数据安全评估
随着对云服务需求的增加,大多数公司都试图提供大量的云服务并从中受益,其中最重要的服务之一是计算云市场中数据加密的成本。本文提出的工作证明了加密密钥在数学上是可变的,这反过来又使得很难猜测数据的解码,并通过分别基于本地成本和趋势线规则生成私钥和公钥来扩展云安全模型。由于从证明结果中可以明显看出解码时间的增加,因此使用对称和非对称加密算法实现和测试了适当的安全级别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Enhanced Real-Time Shadow Rendering Technique in Outdoor Augmented Reality Enhanced Security of the Internet of Medical Things (IOMT) A Hybrid Approach for Automatic Morphological Diacritization of Arabic Text Improving DNA Computing through CRISPR based Model and Visual DNA Tool A new strategy for mobility prediction in the PCS network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1