Saja J. Mohammed
University of Mosul

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

From cloud computing security towards homomorphic encryption: A comprehensive review Saja J. Mohammed; Dujan B. Taha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.16875

Abstract

“Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing.
Encrypting an audio file based on integer wavelet transform and hand geometry Zeena N. Al-Kateeb; Saja J. Mohammed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14216

Abstract

A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.