An integrated methodology for big data classification and security for improving cloud systems data mobility

I Hababeh, A Gharaibeh, S Nofal, I Khalil - IEEE Access, 2018 - ieeexplore.ieee.org
The expand trend of cloud data mobility led to malicious data threats that necessitate using
data protection techniques. Most cloud system applications contain valuable and …

[HTML][HTML] Data migration need, strategy, challenges, methodology, categories, risks, uses with cloud computing, and improvements in its using with cloud using …

AA Hussein - Journal of Information Security, 2021 - scirp.org
Data Migration is a multi-step process that begins with analyzing old data and culminates in
data uploading and reconciliation in new applications. With the rapid growth of data …

Increasing the security of mp3 steganography using AES Encryption and MD5 hash function

R Indrayani, HA Nugroho, R Hidayat… - 2016 2nd International …, 2016 - ieeexplore.ieee.org
In the internet age, the security of data exchange becomes risky from some tapping attacks.
One of the ways to maintain the data's security is by using steganography techniques. In this …

Security enhancement for data migration in the cloud

JR Ngnie Sighom, P Zhang, L You - Future Internet, 2017 - mdpi.com
In today's society, cloud computing has significantly impacted nearly every section of our
lives and business structures. Cloud computing is, without any doubt, one of the strategic …

[PDF][PDF] A review on cloud computing security

OI Omotosho - International Journal of Computer Science and Mobile …, 2019 - academia.edu
Cloud computing is commonly used to represent any work done on a computer, mobile or
any device, where the data and possibly the application being used do not reside on the …

Composite field arithematic based s-box for aes algorithm

SV GADED, A Deshpande - 2019 3rd International conference …, 2019 - ieeexplore.ieee.org
Generally AES algorithm uses Substitution box which works with ROM based lookup tables.
Using the rom based Look up table, there occurs a significant irreducible amount of delay in …

[PDF][PDF] Time performance analysis of advanced encryption standard and data encryption standard in data security transaction

Z Kasiran, HF Ali, NM Noor - Indonesian Journal of Electrical …, 2019 - academia.edu
The advancement of the data communication technologies has increased the traffic of data
exchange over the internet and at the same time created the opportunity of data attack by …

A new approach in expanding the hash size of MD5

EV Maliberan, AM Sison… - International Journal of …, 2018 - search.proquest.com
The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280
bits from the original size of 128 bit using XOR and AND operators. Findings revealed that …

Modified SHA1: a hashing solution to secure web applications through login authentication

EV Maliberan - International Journal of Communication …, 2019 - search.proquest.com
The modified SHA1 algorithm has been developed by expanding its hash value up to 1280
bits from the original size of 160 bit. This was done by allocating 32 buffer registers for …

Text encryption using Bi-amold cat map and modulus operation

EH Rachmawanto, R Zulfiningrum… - … on Application for …, 2021 - ieeexplore.ieee.org
This research proposes an encryption method in text that adopts the chaotic method which is
popularly used in 2D matrices such as images. Chaos methods such as Arnold's Cat Map …