Work place: Al-Azhar University-Gaza, Faculty of Engineering and Information Technology, Department of Information Technology, Gaza, Palestine
E-mail: M.i.k.1948.1948@gmail.com
Website:
Research Interests:
Biography
Mr. Mohammed Ibraheem AL Kahlout, currently is working as a lecturer in the department of Information Technology, Faculty of Engineering and Information Technology, Al-Azhar University, Gaza Strip, Palestine. He holds a bachelor's degree in Information Technology, Paletine University (2016) and a Master's degree in Computing and Information Systems, Department of Information Technology, Faculty of Engineering and Information Technology, Al-Azhar University, Palestine. He was working as a part time lecturer in the department of Computer Science, Gaza University, Palestine (2020). Moreover, he is Expert in Multimedia Technology, He worked as a teacher of the technology curriculum in UNRWA schools 2018. His research interest in Information Security, and the virtual educational environment.
By Ahmed Y. Mahmoud Mohammed Ibraheem AL Kahlout
DOI: https://doi.org/10.5815/ijcnis.2024.05.04, Pub. Date: 8 Oct. 2024
Maintaining privacy is becoming increasingly challenging due to growing reliance on cloud services and software, respectively. Our data is stored in a virtual environment on unreliable cloud machines, making it susceptible to privacy breaches if not handled properly. Encrypting data before uploading it can be a solution to this problem, but it can be time-consuming. However, all of the encryption methods used to safeguard digital data so far did not fulfillment privacy and integration requirements. This is because encryption cannot function independently. Data that is encrypted and stored on a single cloud server can still be accessed by attackers, compromising the privacy of the data. In this paper, we propose a new model based on the user's classification of privacy level. The proposed model divides the digital file into multiple fragments and separately encrypts each fragment; each fragment is encrypted as separated blocks. Additionally, permutation is implemented on encrypted fragments because they are stored in the cloud with replication fragments on another cloud service. This approach ensures that even if the attacker’s gains access to one fragment, they would not be able to access the entire file, thereby safeguarding the privacy of the data.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals