Architectural Design for Data Security in Cloud-based Big Data Systems

NI Ali, AG Memon, A Jamali - Baghdad Science Journal, 2024 - bsj.uobaghdad.edu.iq
Architecture design of system is creative process after all. Non-functional requirements and
software architecture have a strong relationship. Security of system is one of great concern …

An Empirical Evaluation of Data Integrity Algorithm Performance in Non-Relational Document Databases

NI Ali, IA Brohi, MU Murad, Y Nawaz, U Urooj - VAWKUM Transactions on …, 2023 - vfast.org
Non-relational document databases are a type of NoSQL databases, are gaining popularity
owing to their flexibility, scalability, and performance. Document databases provide some …

Blockchain Technology Performance of Asymmetric Algorithms: An Empirical Study

NN Channa, A Jamali, AA Jamali, M Ali… - VFAST Transactions on …, 2023 - vfast.org
Blockchain technology is a transparent, and unchangeable distributed ledger. It has the
potential to transform the way to interact with the digital world by allowing to construct a …

An empirical study of performance of block cipher algorithms in cloud computing environment

G Nabi, AK Baloch, AR Baloch, A Jamali… - VFAST Transactions on …, 2023 - vfast.org
The security of private and sensitive data stored in the public domain is a major problem. It is
critical for the user that data be safe both in transit and even after it has been stored on the …

[PDF][PDF] Blockchain Technology Performance of Asymmetric Algorithms: An Empirical Study

M Ali - 2023 - academia.edu
Blockchain technology is a transparent, and unchangeable distributed ledger. It has the
potential to transform the way to interact with the digital world by allowing to construct a …