455 research outputs found

    Data security in cloud storage services

    Get PDF
    Cloud Computing is considered to be the next-generation architecture for ICT where it moves the application software and databases to the centralized large data centers. It aims to offer elastic IT services where clients can benefit from significant cost savings of the pay-per-use model and can easily scale up or down, and do not have to make large investments in new hardware. However, the management of the data and services in this cloud model is under the control of the provider. Consequently, the cloud clients have less control over their outsourced data and they have to trust cloud service provider to protect their data and infrastructure from both external and internal attacks. This is especially true with cloud storage services. Nowadays, users rely on cloud storage as it offers cheap and unlimited data storage that is available for use by multiple devices (e.g. smart phones, tablets, notebooks, etc.). Besides famous cloud storage providers, such as Amazon, Google, and Microsoft, more and more third-party cloud storage service providers are emerging. These services are dedicated to offering more accessible and user friendly storage services to cloud customers. Examples of these services include Dropbox, Box.net, Sparkleshare, UbuntuOne or JungleDisk. These cloud storage services deliver a very simple interface on top of the cloud storage provided by storage service providers. File and folder synchronization between different machines, sharing files and folders with other users, file versioning as well as automated backups are the key functionalities of these emerging cloud storage services. Cloud storage services have changed the way users manage and interact with data outsourced to public providers. With these services, multiple subscribers can collaboratively work and share data without concerns about their data consistency, availability and reliability. Although these cloud storage services offer attractive features, many customers have not adopted these services. Since data stored in these services is under the control of service providers resulting in confidentiality and security concerns and risks. Therefore, using cloud storage services for storing valuable data depends mainly on whether the service provider can offer sufficient security and assurance to meet client requirements. From the way most cloud storage services are constructed, we can notice that these storage services do not provide users with sufficient levels of security leading to an inherent risk on users\u27 data from external and internal attacks. These attacks take the form of: data exposure (lack of data confidentiality); data tampering (lack of data integrity); and denial of data (lack of data availability) by third parties on the cloud or by the cloud provider himself. Therefore, the cloud storage services should ensure the data confidentiality in the following state: data in motion (while transmitting over networks), data at rest (when stored at provider\u27s disks). To address the above concerns, confidentiality and access controllability of outsourced data with strong cryptographic guarantee should be maintained. To ensure data confidentiality in public cloud storage services, data should be encrypted data before it is outsourced to these services. Although, users can rely on client side cloud storage services or software encryption tools for encrypting user\u27s data; however, many of these services fail to achieve data confidentiality. Box, for example, does not encrypt user files via SSL and within Box servers. Client side cloud storage services can intentionally/unintentionally disclose user decryption keys to its provider. In addition, some cloud storage services support convergent encryption for encrypting users\u27 data exposing it to “confirmation of a file attack. On the other hand, software encryption tools use full-disk encryption (FDE) which is not feasible for cloud-based file sharing services, because it encrypts the data as virtual hard disks. Although encryption can ensure data confidentiality; however, it fails to achieve fine-grained access control over outsourced data. Since, public cloud storage services are managed by un-trusted cloud service provider, secure and efficient fine-grained access control cannot be realized through these services as these policies are managed by storage services that have full control over the sharing process. Therefore, there is not any guarantee that they will provide good means for efficient and secure sharing and they can also deduce confidential information about the outsourced data and users\u27 personal information. In this work, we would like to improve the currently employed security measures for securing data in cloud store services. To achieve better data confidentiality for data stored in the cloud without relying on cloud service providers (CSPs) or putting any burden on users, in this thesis, we designed a secure cloud storage system framework that simultaneously achieves data confidentiality, fine-grained access control on encrypted data and scalable user revocation. This framework is built on a third part trusted (TTP) service that can be employed either locally on users\u27 machine or premises, or remotely on top of cloud storage services. This service shall encrypts users data before uploading it to the cloud and decrypts it after downloading from the cloud; therefore, it remove the burden of storing, managing and maintaining encryption/decryption keys from data owner\u27s. In addition, this service only retains user\u27s secret key(s) not data. Moreover, to ensure high security for these keys, it stores them on hardware device. Furthermore, this service combines multi-authority ciphertext policy attribute-based encryption (CP-ABE) and attribute-based Signature (ABS) for achieving many-read-many-write fine-grained data access control on storage services. Moreover, it efficiently revokes users\u27 privileges without relying on the data owner for re-encrypting massive amounts of data and re-distributing the new keys to the authorized users. It removes the heavy computation of re-encryption from users and delegates this task to the cloud service provider (CSP) proxy servers. These proxy servers achieve flexible and efficient re-encryption without revealing underlying data to the cloud. In our designed architecture, we addressed the problem of ensuring data confidentiality against cloud and against accesses beyond authorized rights. To resolve these issues, we designed a trusted third party (TTP) service that is in charge of storing data in an encrypted format in the cloud. To improve the efficiency of the designed architecture, the service allows the users to choose the level of severity of the data and according to this level different encryption algorithms are employed. To achieve many-read-many-write fine grained access control, we merge two algorithms (multi-authority ciphertext policy attribute-based encryption (MA- CP-ABE) and attribute-based Signature (ABS)). Moreover, we support two levels of revocation: user and attribute revocation so that we can comply with the collaborative environment. Last but not least, we validate the effectiveness of our design by carrying out a detailed security analysis. This analysis shall prove the correctness of our design in terms of data confidentiality each stage of user interaction with the cloud

    Performance enhancement of large scale networks with heterogeneous traffic.

    Get PDF
    Finally, these findings are applied towards improving the performance of the Differentiated Services architecture by developing a new Refined Assured Forwarding framework where heterogeneous traffic flows share the same aggregate class. The new framework requires minimal modification to the existing Diffserv routers. The efficiency of the new architecture in enhancing the performance of Diffserv is demonstrated by simulation results under different traffic scenarios.This dissertation builds on the notion that segregating traffic with disparate characteristics into separate channels generally results in a better performance. Through a quantitative analysis, it precisely defines the number of classes and the allocation of traffic into these classes that will lead to optimal performance from a latency standpoint. Additionally, it weakens the most generally used assumption of exponential or geometric distribution of traffic service time in the integration versus segregation studies to date by including self-similarity in network traffic.The dissertation also develops a pricing model based on resource usage in a system with segregated channels. Based on analytical results, this dissertation proposes a scheme whereby a service provider can develop compensatory and fair prices for customers with varying QoS requirements under a wide variety of ambient traffic scenarios.This dissertation provides novel techniques for improving the Quality of Service by enhancing the performance of queue management in large scale packet switched networks with a high volume of traffic. Networks combine traffic from multiple sources which have disparate characteristics. Multiplexing such heterogeneous traffic usually results in adverse effects on the overall performance of the network

    A forgácsképzés paramétereinek optimalizációja egyiptine nezőgazdasági hulladékanyagok feldolgozásakor

    Get PDF
    A szántóföldi hulladékanyagok az egyiptomi mezőgazdaság egyik legkritikusabb problémáját jelentik. E probléma megoldásának első lépése apríték és forgács képzése ezekből a lignocellulóz alapú hulladé - kokból, melyet több termék gyártására is fel lehet használni. A forgácsképzés paramétereinek optimali\ud - zálása céljából egy helyi kalapácsos malom vizsgálatára került sor, különböző mezőgazdasági hulladékok (kukoricaszár – Zea mays L., rizsszalma – Oriza glaberrima, és gyapotszár – Gossypium spp.) feldol - gozása folyamán. A berendezés termelékenységét, energiafelvételét, valamint a forgácshalmaz méret - eloszlását a kerületi sebesség, a szitaméret és az alapanyag nedvességtartalma függvényében vizsgáltuk. A kísérleti eredmények alapján a berendezés működése a vizsgált tartományon belül a legalacso - nyabb nedvességtartalom és a legmagasabb kerületi sebesség esetén volt optimális. A vártnak meg - felelően a legkisebb szitaméret esetén megnőtt a finomfrakció mennyisége, de megnövekedett az energiafelvétel és csökkent a termelékenység. Ezek az eredmények mindhárom mezőgazdasági hulladékanyag esetében hasonlók voltak

    Impact of micro-indentation load/time and Zinc concentration on the thermo-mechanical characteristics of amorphous Se78_{78}Te20_{20}Sn2_2 alloy

    Full text link
    We have performed hardness measurement experiments under different loads and loading times by performing micro-indentation marks in the present work. Chalcogenide glasses (ChGs) comprising Se78_{78}Te20_{20}Sn2_2 and Se78x_{78-x}Te20_{20}Sn2_2Znx_x (where x=0,2,4,6x = 0, 2, 4, 6) alloys are the subject of micro-indentation tests in this work. We have utilized both micro-indentation and optical microscopic methods to determine Vickers hardness. Thermal glass transition phenomena have been identified through DSC techniques. The modulus of elasticity (E), an essential mechanical property, has been evaluated using established empirical equations. Further, we have studied other mechanical parameters [e.g., minimal micro-void formation energy (Eh), glass's fragility index (m), micro-void volume (Vh), etc.] and the covalent character of the glassy system. Additionally, various physical parameters, including density, molar volume, and compactness, have also been determined

    Criminal Liability for Artificial Intelligence Crimes

    Get PDF
    Artificial intelligence crimes are considered near future crimes If not some of them have now begun, Technological development has helped in recent years - Which accelerated in the current period - In the emergence of many of these crimes, The advanced programming of some Artificial intelligence machines has given the ability to build self-experience, Enabling them to make individual decisions in any situations they face like human beings; So we aim from this study legalization of Artificial intelligence crimes To determine the responsible for those crimes and the penalty is imposed on it; The importance of the subject lies in That at this time there is no fields of life that Artificial intelligence did not interfere, and With this widespread, the crimes related to it will increase, It was therefore necessary to examine criminal liability for crimes committed by Artificial intelligence, And who will be responsible?, To determine the real perpetrator to be subjected to legal punishment; The issue raises multiple problems Related to basic problem, If Artificial intelligence committed a criminal offense, who will be the criminally liable for that crime? Resulting in a number of problems such as, Granting legal personality to Artificial intelligence, And the inability of ordinary laws to keep pace with this development; and We have come up with a set of results The rapid spread of AI techniques and their penetration into various aspects of life, With no legislation protecting society from such crimes, This requires the enactment of legislation to organize the production and development of Artificial intelligence techniques, To reach a legal perception that allows criminal accountability

    Terrorism in the Digital Era (Cyber Terrorism): Types، Risks & Mechanisms of Encountering

    Get PDF
    تهدف الورقة الحالية إلى دراسة ظاهرة الإرهاب الذي يستخدم الوسائل الإلكترونية والرقمية، وأصبح يسمي الإرهاب الرقمي، أو الإرهاب الإلكتروني، بما يؤدي إلى توعية المجتمع عن هذه الظاهرة من كافة جوانبها، وصورها ومخاطرها وأسإليب مواجهتها، وتتناول الورقة الحالية النقاط التإلية: )المقصود بالإرهاب الإلكتروني وخصائصه وأسبابه، صور الإرهاب الإلكتروني ومخاطره، وإليات وخطط مواجهة الإرهاب الإلكتروني(.The present paper aims to study the phenomenon of terrorism, which uses electronic and digital means, that called digital terrorism, or Cyber terrorism, which leads to raising the awareness of society about this phenomenon in all its aspects, forms, dangers and methods of confronting them. The present paper deals with the following points: Electronic properties and its dangers, mechanisms and plans to confront electronic terrorism)

    Scientific Conferences: What is for it and what is on it?

    Get PDF
    ملخص: تعد المؤتمرات واللقاءات العلمية من اهم الانشطة العلمية والاكاديمية للمؤسسات الجامعية والبحثية، لما لها من اهمية لا تخفي عن الجميع في تنمية المعارف والمهارات وزيادة الخبرات والتعرف على الشخصيات العلمية؛ ولذلك يحرص كثير من طلبة العلم والباحثين على حضور المؤتمرات والندوات والملتقيات العلمية ومتابعة أخبارها واقتناء أوراقها. وعلى الرغم من أن تلك المؤتمرات والندوات العملية المحلية العامة والخاصة؛ شهدت حراكاً واسعاً وتطوراً ملموساً في السنوات الأخيرة ؛ إلا أن الكثير منها لم يقدم الجديد ولا تزال دون المستوى المطلوب والمأمول والمنتظر ولا تلامس احتياجات الواقع وتحديداً من حيث محتواها ومضمونها وإعدادها وتقديمها والدعوى لها، ومخرجاتها، الامر الذى يستدعى ضرورة مناقشة اهمية المؤتمرات العلمية فوائدها، المـأخذ عليها وتقديم مجموعة المقترحات لتفعيل دورها في تطوير البحث العلمي والباحثين وخدمة المجتمع. الكلمات المفتاحية: البحث العلمي، المؤتمرات العلمية، اللقاءات العلميةAbstract: Conferences and scientific meetings are the most important scientific and academic activities of the university and research institutions because they have an importance that is not hidden from everyone in the development of knowledge and skills and increase experience and identification of scientific figures. Therefore, many students of science and researchers are keen to attend conferences, seminars and scientific forums. Despite the fact that these local and private public and private conferences and seminars have witnessed considerable mobility and development in recent years, many of them have not yet presented the new and are still below the desired, expected and expected level, and do not touch the needs of the reality, specifically in terms of content, content, preparation, presentation, , Which necessitates the need to discuss the importance of scientific conferences and its benefits, and the introduction of a set of proposals to activate its role in the development of scientific research and researchers and community service. Keywords: scientific research, scientific conferences

    The Role of ICT in Supporting the Democratic Movement: Digital Democracy as a Model

    Get PDF
    دور تكنولوجيا المعلومات في دعم التحولات الديمقراطية: الديمقراطية الرقمية نموذجا   ا د/ جمال علي الدهشان   أستاذ أصول التربية، وعميد كلية جامعة المنوفية، مصر. [email protected]   قدمت للنشر في 1 / 1 /2018م                            قبلت في 4/2 / 2018م   الملخص   تهدف الورقة الحالية إلى استعراض الدور الذي يمكن أن تلعبه تكنولوجيا المعلومات في المجال السياسي بصفة عامة ودعم الديمقراطية خاصة، متمثلة في ظهور ما أطلق عليه الديمقراطية الرقمية، والآليات التي يتم من خلالها تحقيقها، الفعاليات التعليمية التي يتم من خلالها تفعيل الديمقراطية الرقمية بمؤسساتنا التعليمية من خلال تناول مجموعة نقاط هي: الدور السياسي لتكنولوجيا المعلومات والاتصالات بصفة عامة ودعم الديمقراطية خاصة. وتحديد المقصود بالديمقراطية الرقمية ومستوياتها، وخصائصها، وأهميتها. وتحديد آليات وأدوات الديمقراطية الرقمية. ومعوقات أو مآخذ الديمقراطية الرقمية. وتوضيح الفعاليات التعليمية التي يتم من خلالها تفعيل الديمقراطية الرقمية بمؤسساتنا التعليمية.The present paper aims to reviewing the role that information technology which can play in the political domain in general. In particular supporting democracy. As shown in emergence the digital democracy and the mechanisms through which it is achieved. The educational activities through which digital democracy is activated in our educational institutions through Addressed a set of points: the political role of ICT in general and support for democracy in particular. Moreover, to define the meaning, levels, characteristics and importance of digital democracy. In addition, identify the mechanisms and tools of digital democracy. In addition, the constraints or pitfalls of digital democracy. Moreover, clarify the educational activities through which the activation of digital democracy in our educational institutions
    corecore