首页 > 最新文献

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

英文 中文
On large-hollow lifting modules 在大型空心吊装模块上
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2095108
Amira A. Abduljaleel, Sahira M. Yaseen
Abstract In this paper, we introduce the concept of Large-hollow lifting modules and we give some properties of this new kind of module.
本文介绍了大型空心提升模块的概念,并给出了这种新型模块的一些特性。
{"title":"On large-hollow lifting modules","authors":"Amira A. Abduljaleel, Sahira M. Yaseen","doi":"10.1080/09720529.2022.2095108","DOIUrl":"https://doi.org/10.1080/09720529.2022.2095108","url":null,"abstract":"Abstract In this paper, we introduce the concept of Large-hollow lifting modules and we give some properties of this new kind of module.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44535881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack 一种基于改进混沌Elman神经网络的入侵检测系统,用于保护移动自组织网络免受DDoS攻击
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2075063
Tuka Kareem Jebuer
Abstract A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.
摘要移动自组织网络(MANET)是一组移动节点,它们组合成一个没有预定义基础设施的网络。有许多类型的攻击可能以MANETS为目标,其中之一就是分布式拒绝服务攻击(DDoS)。DDoS被定义为攻击路由功能并摧毁移动自组织网络的整个操作。DDoS攻击的两个主要受害者是路由功能和电池容量。DDoS攻击可能导致路由表溢出,进而可能导致受感染节点泛滥。路由溢出之后是创建一个伪路由数据包,以消耗参与活动节点的可用资源。这一原因扰乱了合法路线的正常运作。近年来,为了提高MANET的安全级别,人们采用了不同的方法。在这项工作中,提出了基于Cuckoo搜索算法的改进Elman神经网络(CSA-MENN)方法来克服DDoS攻击。CSA-MENN方法由三部分组成:杜鹃搜索算法聚类区域以增强从源到目的地的路径,利用混沌理论模块检测异常节点,然后利用改进的Elman神经网络(MENN)通过确定消耗更多资源的节点来防止恶意节点向目的地发送数据。数据包可能会丢失,或者受害者可能会重置攻击者与自身之间的路径。CICIDS数据集已用于测试和评估基于准确性、数据包丢失和抖动标准的所提出方法的性能。本文中使用的数据集CICIDS 2017将数据分为7组:5组用于训练,1组用于验证,1组进行泛化。总之,大约71.4%的数据用于训练,28.6%用于验证和概括。
{"title":"An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack","authors":"Tuka Kareem Jebuer","doi":"10.1080/09720529.2022.2075063","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075063","url":null,"abstract":"Abstract A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41679929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complex multi–fuzzy subgroups 复多模糊子群
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2101250
M. Alsarahead, A. Al-Husban
Abstract There has been an increased recognition that more attention needs to be paid to the area of fuzzy algebra. A closer look at the literature, reveals several gaps and shortcomings such as the concept of complex multi-fuzzy subgroups. This article introduces the concept as well as investigates the nexus between complex multi-fuzzy subgroups and multi-fuzzy subgroups. Further, this article discovers that each complex multi-fuzzy subgroup produces two multi-fuzzy subgroups. Furthermore, there is additional discussion of the nexus between complex multi-fuzzy subgroups and classical subgroups. Finally, characterizes and illustrates the back-and-forth images carried by such a group homomorphism.
人们越来越认识到,模糊代数领域需要给予更多的关注。仔细研究文献,会发现一些空白和不足,如复杂多模糊子群的概念。本文介绍了复多模糊子群和多模糊子群的概念,并研究了它们之间的关系。此外,本文还发现每个复多模糊子群产生两个多模糊子群。此外,还进一步讨论了复多模糊子群与经典子群之间的关系。最后,刻画和说明了这种群同态所携带的来回图像。
{"title":"Complex multi–fuzzy subgroups","authors":"M. Alsarahead, A. Al-Husban","doi":"10.1080/09720529.2022.2101250","DOIUrl":"https://doi.org/10.1080/09720529.2022.2101250","url":null,"abstract":"Abstract There has been an increased recognition that more attention needs to be paid to the area of fuzzy algebra. A closer look at the literature, reveals several gaps and shortcomings such as the concept of complex multi-fuzzy subgroups. This article introduces the concept as well as investigates the nexus between complex multi-fuzzy subgroups and multi-fuzzy subgroups. Further, this article discovers that each complex multi-fuzzy subgroup produces two multi-fuzzy subgroups. Furthermore, there is additional discussion of the nexus between complex multi-fuzzy subgroups and classical subgroups. Finally, characterizes and illustrates the back-and-forth images carried by such a group homomorphism.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47981464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On pseudo valuation module and injectivity property 伪估值模块与注入性
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2060919
Amnah M. Saleh, M. M. Abed
Abstract In this paper; we study the relationship between two modules in module theory namely injective and pseudo valuation modules. We investigated that every module has three properties which are noetherian, cyclic and regular is pseudo valuation modules. Also, if R is an Artinian ring and E is finitely generated regular module, it implies that E is (P.V.M). We proved that for an R-module E, if R is a commutative ring with E is a Noetherian, Artinian and regular module, then E is P.V.M. Finally, some definitions and new results have introduced in this paper.
摘要:本文;研究了模论中两个模之间的关系,即内射模和伪估值模。我们研究了伪估值模块具有诺etherian、循环和正则三个性质。同样,如果R是阿提尼环,E是有限生成正则模,则E为(P.V.M)。证明了对于一个R模E,如果R是一个交换环,且E是一个noether、Artinian和正则模,则E是p.v.m。最后给出了一些定义和新的结果。
{"title":"On pseudo valuation module and injectivity property","authors":"Amnah M. Saleh, M. M. Abed","doi":"10.1080/09720529.2022.2060919","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060919","url":null,"abstract":"Abstract In this paper; we study the relationship between two modules in module theory namely injective and pseudo valuation modules. We investigated that every module has three properties which are noetherian, cyclic and regular is pseudo valuation modules. Also, if R is an Artinian ring and E is finitely generated regular module, it implies that E is (P.V.M). We proved that for an R-module E, if R is a commutative ring with E is a Noetherian, Artinian and regular module, then E is P.V.M. Finally, some definitions and new results have introduced in this paper.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47898852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About the dual soft sets theory 关于对偶软集理论
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2060917
L. Al-Swidi, Mustafa. H. Hadi, Reyadh. D. Ali
Abstract Soft sets play a prominent role in solving many engineering and scientific problems. After a thorough study of it and to the fuzzy sets, there were real scientific and engineering problems that these sets could not give a typical solution to them, so the idea of expanding these sets came up and we call them the dual soft sets. Also we defined the dual soft points differently to those sets.
摘要软集在解决许多工程和科学问题中发挥着突出的作用。经过对它和模糊集的深入研究,确实存在一些科学和工程问题,这些集不能给出它们的典型解,因此产生了扩展这些集的想法,我们称之为对偶软集。此外,我们对对偶软点的定义与这些集合不同。
{"title":"About the dual soft sets theory","authors":"L. Al-Swidi, Mustafa. H. Hadi, Reyadh. D. Ali","doi":"10.1080/09720529.2022.2060917","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060917","url":null,"abstract":"Abstract Soft sets play a prominent role in solving many engineering and scientific problems. After a thorough study of it and to the fuzzy sets, there were real scientific and engineering problems that these sets could not give a typical solution to them, so the idea of expanding these sets came up and we call them the dual soft sets. Also we defined the dual soft points differently to those sets.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48746386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Symmetric text encryption scheme based Karhunen Loeve transform 基于Karhunen - Loeve变换的对称文本加密方案
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2095114
N. F. H. Al-Saffar, Inaam. R. Al-Saiq
Abstract Recently cryptography is one of the essence areas of study. There are two types of cryptography, this paper is concerned with the simplest and fastest which is “Symmetric Key Cryptography”. Symmetric encryption text information is widely known as an effective and secure method for the purpose of secure transmission. In this paper, we present a new symmetric encryption scheme for text encryption and decryption based on Karhunen Loeve transform, where Karhunen Loeve transform is a reversible linear transform. The time complexity of the proposed scheme is calculated for both encryption and decryption. The proposed scheme has an has efficiency according to the security measures.
密码学是近年来研究的热点之一。密码学有两种类型,本文研究的是最简单、最快的“对称密钥密码学”。对称加密是一种有效的、安全的文本信息传输方法。本文提出了一种基于Karhunen Loeve变换的文本加解密对称加密方案,其中Karhunen Loeve变换是一种可逆的线性变换。计算了加密和解密方案的时间复杂度。从安全措施上看,该方案具有较好的有效性。
{"title":"Symmetric text encryption scheme based Karhunen Loeve transform","authors":"N. F. H. Al-Saffar, Inaam. R. Al-Saiq","doi":"10.1080/09720529.2022.2095114","DOIUrl":"https://doi.org/10.1080/09720529.2022.2095114","url":null,"abstract":"Abstract Recently cryptography is one of the essence areas of study. There are two types of cryptography, this paper is concerned with the simplest and fastest which is “Symmetric Key Cryptography”. Symmetric encryption text information is widely known as an effective and secure method for the purpose of secure transmission. In this paper, we present a new symmetric encryption scheme for text encryption and decryption based on Karhunen Loeve transform, where Karhunen Loeve transform is a reversible linear transform. The time complexity of the proposed scheme is calculated for both encryption and decryption. The proposed scheme has an has efficiency according to the security measures.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47244408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Minimum spanning tree application in Covid-19 network structure analysis in the countries of the Middle East 最小生成树在中东地区Covid-19网络结构分析中的应用
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2060923
Baidaa Saleh Mahdi, Jalal Hatem Hussein Al-Bayati, Amer J. Al-Mahdawi
Abstract Coronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.
冠状病毒病(Covid-19)已经威胁到人类的生命,因此有必要从多个方面对这种疾病进行研究。本研究旨在通过将这些国家指定为拟议图的头部并使用超度量生成树测量它们之间的距离,来确定这些国家之间相互依赖的影响的性质以及彼此对彼此的影响。本文利用图论的工具描述了一个中东国家网络。
{"title":"Minimum spanning tree application in Covid-19 network structure analysis in the countries of the Middle East","authors":"Baidaa Saleh Mahdi, Jalal Hatem Hussein Al-Bayati, Amer J. Al-Mahdawi","doi":"10.1080/09720529.2022.2060923","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060923","url":null,"abstract":"Abstract Coronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48520666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructing featured supereulerian graph 构造特征超欧拉图
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2021.2005232
M. Algefari
Abstract A graph is supereulerian if it has a spanning eulerian subgraph. In this paper we construct a supereulerian graph controlling its matching number, minimum degree and edge connectivity, where δ(G) < α′(G)
摘要如果图有一个生成欧拉子图,那么它就是超欧拉图。本文构造了一个控制其匹配数、最小度和边连通性的超欧拉图,其中δ(G)<α′(G)
{"title":"Constructing featured supereulerian graph","authors":"M. Algefari","doi":"10.1080/09720529.2021.2005232","DOIUrl":"https://doi.org/10.1080/09720529.2021.2005232","url":null,"abstract":"Abstract A graph is supereulerian if it has a spanning eulerian subgraph. In this paper we construct a supereulerian graph controlling its matching number, minimum degree and edge connectivity, where δ(G) < α′(G)","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44658548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On simple submodules and C-rings 在简单子模和c环上
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2083682
Shaymaa E. Sarhan, M. M. Abed
Abstract In this paper; we will study the relationship between simple submodules of M and the C-ring. A ring R is called C-ring if every torsion module M over R has simple submodules. We investigated that if M is a torsion module over a semisimple ring; so, R is C-ring. Also, we study C-ring when R is Noetherian and T(M) = M such that any direct sum of modules with (SIP) has (SSP) implies that R is C- ring. We proved that if M is a torsion module and M = W + W′, this means R is C-ring where W and W′ are direct sum of M.
摘要在本文中;我们将研究M的简单子模与C环之间的关系。如果R上的每个扭模M都有简单的子模,则环R称为C-环。我们研究了如果M是半单环上的扭转模;所以,R是C形环。此外,我们还研究了当R是诺瑟环且T(M)=M时的C环,使得具有(SIP)的模的任何直和都具有(SSP)意味着R是C环。我们证明了如果M是一个扭模,M=W+W′,这意味着R是C环,其中W和W′是M的直和。
{"title":"On simple submodules and C-rings","authors":"Shaymaa E. Sarhan, M. M. Abed","doi":"10.1080/09720529.2022.2083682","DOIUrl":"https://doi.org/10.1080/09720529.2022.2083682","url":null,"abstract":"Abstract In this paper; we will study the relationship between simple submodules of M and the C-ring. A ring R is called C-ring if every torsion module M over R has simple submodules. We investigated that if M is a torsion module over a semisimple ring; so, R is C-ring. Also, we study C-ring when R is Noetherian and T(M) = M such that any direct sum of modules with (SIP) has (SSP) implies that R is C- ring. We proved that if M is a torsion module and M = W + W′, this means R is C-ring where W and W′ are direct sum of M.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44689379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on security issues and solutions in cloud computing 回顾云计算中的安全问题和解决方案
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133253
Devanshi Ledwani, Himanshi Saini, Lalita Ledwani, Swami Nisha Bhagirath, Vaibhav Bhatnagar
Abstract Cloud computing is the on-demand availability of a group of networked elements providing services, especially data storage and computing power, without actual management and addressing by the user. In lieu, the entire suite of hardware and software is managed by a provider and have functions dispersed over various location, each location being a data center. Since cloud computing users rely on sharing resources and may request multiple cloud services concurrently, a dynamic provision must be there so that all the resources are available to the user in a competent manner. However, despite abundantly available benefits, many organizations are still skeptical about using the cloud computing service model because of security concerns associated with the service. The paper also discusses different types of cloud security, controls of cloud security and algorithms used for emanating the privacy of the client’s data. In this paper, a CNN and SVM model is also applied for detection Anti-Spoofing images for identification on images on cloud.
摘要云计算是一组网络元素的按需可用性,提供服务,特别是数据存储和计算能力,而无需用户进行实际管理和寻址。取而代之的是,整个硬件和软件套件由提供商管理,并具有分散在不同位置的功能,每个位置都是一个数据中心。由于云计算用户依赖于共享资源,并且可以同时请求多个云服务,因此必须有一个动态的供应,以便所有资源都能以合格的方式对用户可用。然而,尽管有很多可用的好处,但由于与云计算服务相关的安全问题,许多组织仍然对使用云计算服务模型持怀疑态度。本文还讨论了不同类型的云安全、云安全控制以及用于发布客户端数据隐私的算法。本文还将CNN和SVM模型应用于反欺骗图像的检测,用于云上图像的识别。
{"title":"Review on security issues and solutions in cloud computing","authors":"Devanshi Ledwani, Himanshi Saini, Lalita Ledwani, Swami Nisha Bhagirath, Vaibhav Bhatnagar","doi":"10.1080/09720529.2022.2133253","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133253","url":null,"abstract":"Abstract Cloud computing is the on-demand availability of a group of networked elements providing services, especially data storage and computing power, without actual management and addressing by the user. In lieu, the entire suite of hardware and software is managed by a provider and have functions dispersed over various location, each location being a data center. Since cloud computing users rely on sharing resources and may request multiple cloud services concurrently, a dynamic provision must be there so that all the resources are available to the user in a competent manner. However, despite abundantly available benefits, many organizations are still skeptical about using the cloud computing service model because of security concerns associated with the service. The paper also discusses different types of cloud security, controls of cloud security and algorithms used for emanating the privacy of the client’s data. In this paper, a CNN and SVM model is also applied for detection Anti-Spoofing images for identification on images on cloud.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49242289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1