A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Al-Laham, Mohamad M.
- Reducing Security Concerns when Using Cloud Computing in Online Exams Case Study: General Associate Degree Examination (Shamel) in Jordan
Authors
1 Al-Balqa Applied University, Salt 19117, Jordan, JO
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 7, No 6 (2015), Pagination: 131-144Abstract
The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has computerized the exam and one of the suggestions was to utilize the cloud computing applications. However, cloud computing entails many security concerns that may have impacts on the exam information security. This research discusses the current use the cloud computing in many life aspects and then concentrate on online exams aspect; also, this research clarifies the tangible and intangible risks associated with cloud computing adoption. Then, the research examined a specific case study related to the subject matter. Finally, this research explores the level of understanding risks and methods may be used to reduce it and help in protecting data from unauthorized persons.Keywords
SHAMEL Exam, BAU, Cloud Security, Cloud Service Provider, Cloud Computing.- Encryption-Decryption Rgb Color Image Using Matrix Multiplication
Authors
1 Computer Science Dept., Zarqa University, Zarqa, JO
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 7, No 5 (2015), Pagination: 109-119Abstract
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the original image in the receipted side; simple extracted and decryption operations can be maintained. The results shown that the proposed technique is powerful for color image encryption and decryption and a MATLAB and simulations were used to get the results.
The proposed technique has high security features because each color component is separately treated using its own double random matrix key which is generated randomly and make the process of hacking the three keys very difficult.