{"id":"https://openalex.org/W2979948498","doi":"https://doi.org/10.1109/ccece.2019.8861845","title":"A Simple and Secured Cryptography System of Cloud Computing","display_name":"A Simple and Secured Cryptography System of Cloud Computing","publication_year":2019,"publication_date":"2019-05-05","ids":{"openalex":"https://openalex.org/W2979948498","doi":"https://doi.org/10.1109/ccece.2019.8861845","mag":"2979948498"},"language":"en","primary_location":{"id":"doi:10.1109/ccece.2019.8861845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2019.8861845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112474892","display_name":"SM Jahidul Islam","orcid":null},"institutions":[{"id":"https://openalex.org/I16969244","display_name":"University of Eswatini","ror":"https://ror.org/05nv2rz39","country_code":"SZ","type":"education","lineage":["https://openalex.org/I16969244"]},{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD","SZ"],"is_corresponding":true,"raw_author_name":"SM Jahidul Islam","raw_affiliation_strings":["Department of Computer Science, University Of Eswatini, Manzini, Eswatini","Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University Of Eswatini, Manzini, Eswatini","institution_ids":["https://openalex.org/I16969244"]},{"raw_affiliation_string":"Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058442023","display_name":"Zulfiker Haider Chaudhury","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zulfiker Haider Chaudhury","raw_affiliation_strings":["Director, SN and SJ Chowdhury Investments (Pty) Ltd., Manzini, Swaziland"],"affiliations":[{"raw_affiliation_string":"Director, SN and SJ Chowdhury Investments (Pty) Ltd., Manzini, Swaziland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101521748","display_name":"Saiful Islam","orcid":"https://orcid.org/0000-0003-3971-6762"},"institutions":[{"id":"https://openalex.org/I16969244","display_name":"University of Eswatini","ror":"https://ror.org/05nv2rz39","country_code":"SZ","type":"education","lineage":["https://openalex.org/I16969244"]},{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD","SZ"],"is_corresponding":false,"raw_author_name":"Saiful Islam","raw_affiliation_strings":["Department of Computer Science, University Of Eswatini, Manzini, Eswatini","Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University Of Eswatini, Manzini, Eswatini","institution_ids":["https://openalex.org/I16969244"]},{"raw_affiliation_string":"Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112474892"],"corresponding_institution_ids":["https://openalex.org/I16969244","https://openalex.org/I183697816"],"apc_list":null,"apc_paid":null,"fwci":1.6957,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.88535752,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8175393342971802},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7878486514091492},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.6706739664077759},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6261250972747803},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5580781698226929},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.548849880695343},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5379034280776978},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5069301724433899},{"id":"https://openalex.org/keywords/cloudsim","display_name":"CloudSim","score":0.5002009868621826},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20519492030143738}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8175393342971802},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7878486514091492},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.6706739664077759},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6261250972747803},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5580781698226929},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.548849880695343},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5379034280776978},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5069301724433899},{"id":"https://openalex.org/C2779907789","wikidata":"https://www.wikidata.org/wiki/Q22095616","display_name":"CloudSim","level":3,"score":0.5002009868621826},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20519492030143738}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccece.2019.8861845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2019.8861845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W955846059","https://openalex.org/W1562199142","https://openalex.org/W2042001410","https://openalex.org/W2109026747","https://openalex.org/W2125858711","https://openalex.org/W2242382574","https://openalex.org/W2248302901","https://openalex.org/W2260937880","https://openalex.org/W2624122013"],"related_works":["https://openalex.org/W2389256677","https://openalex.org/W2013502867","https://openalex.org/W2353766896","https://openalex.org/W1986630940","https://openalex.org/W1859642347","https://openalex.org/W2123415650","https://openalex.org/W3088000181","https://openalex.org/W812360551","https://openalex.org/W4378418693","https://openalex.org/W1607245420"],"abstract_inverted_index":{"Cloud":[0,11],"computing":[1,28,37],"is":[2,38,158,191],"a":[3,71,175],"vast":[4],"growing":[5,30],"technology":[6],"in":[7,31,59,90,108],"the":[8,23,60,91,132,184],"IT":[9],"industries.":[10],"Service":[12],"Providers":[13],"(CSP)":[14],"are":[15,29,49,57],"offering":[16],"various":[17],"suitable":[18,52,72],"and":[19,47,74,86,162,193,204],"flexible":[20],"services":[21],"to":[22,101,179],"users.":[24,133],"Users":[25,104],"of":[26,43,63,177,189],"cloud":[27,36,64,79,92],"an":[32,40],"equal":[33],"rhyme.":[34],"As":[35],"becoming":[39],"essential":[41],"part":[42],"human":[44],"life,":[45],"users":[46,102],"CSP":[48,113],"noticing":[50],"for":[51,78,111,140,170,182],"security":[53,61,139,201],"feathers.":[54],"Many":[55],"researchers":[56],"working":[58],"aspects":[62],"computing.":[65,80],"In":[66],"this":[67],"paper,":[68],"we":[69,163,194],"present":[70],"cryptography":[73],"secure":[75],"authentication":[76],"system":[77],"This":[81,134,187],"procedure":[82,135],"includes":[83],"auto":[84],"encryption":[85,116],"KEYs":[87,96],"changing":[88],"process":[89,117],"end.":[93],"New":[94],"generated":[95],"will":[97,105,124,136],"not":[98],"be":[99,106,125],"sent":[100],"initially.":[103],"checked":[107],"three":[109],"steps":[110],"authentication.":[112],"can":[114,195],"trigger":[115],"at":[118],"any":[119],"time":[120,178,190],"manually":[121],"or":[122],"it":[123,173,197],"performed":[126],"automatically":[127],"after":[128],"logged":[129],"out":[130],"by":[131,160],"ensure":[137],"extra":[138],"data/files":[141,181],"as":[142,144],"well":[143],"prevent":[145],"hackers":[146],"from":[147,198],"getting":[148],"original":[149],"files/data":[150],"even":[151],"they":[152],"got":[153],"valid":[154],"credential.":[155],"Proposed":[156],"protocol":[157],"simulated":[159],"CloudSim":[161],"observed":[164],"that":[165],"one":[166],"more":[167,203],"step":[168],"needs":[169],"user's":[171],"credential,":[172],"required":[174],"bit":[176,188],"use":[180],"only":[183],"first":[185],"time.":[186],"negligible":[192],"exclude":[196],"consideration":[199],"but":[200],"increase":[202],"more.":[205]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
