{"id":"https://openalex.org/W3217286080","doi":"https://doi.org/10.1155/2021/8113253","title":"A New Secure Model for Data Protection over Cloud Computing","display_name":"A New Secure Model for Data Protection over Cloud Computing","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3217286080","doi":"https://doi.org/10.1155/2021/8113253","mag":"3217286080","pmid":"https://pubmed.ncbi.nlm.nih.gov/35646109"},"language":"en","primary_location":{"id":"doi:10.1155/2021/8113253","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8113253","pdf_url":"https://downloads.hindawi.com/journals/cin/2021/8113253.pdf","source":{"id":"https://openalex.org/S72372694","display_name":"Computational Intelligence and Neuroscience","issn_l":"1687-5265","issn":["1687-5265","1687-5273"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational Intelligence and Neuroscience","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/cin/2021/8113253.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014606696","display_name":"Amr M. Sauber","orcid":"https://orcid.org/0000-0003-4699-5595"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Amr M. Sauber","raw_affiliation_strings":["Faculty of Science, Menoufia University, Shibin El Kom, Egypt","Faculty of Science, Menoufia University, Shibin El Kom"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Menoufia University, Shibin El Kom, Egypt","institution_ids":["https://openalex.org/I63601056"]},{"raw_affiliation_string":"Faculty of Science, Menoufia University, Shibin El Kom","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112383702","display_name":"Passent Elkafrawy","orcid":null},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Passent M. El-Kafrawy","raw_affiliation_strings":["Faculty of Science, Menoufia University, Shibin El Kom, Egypt","School of Information Technology and Computer Science, Nile University, Sheikh Zayed, Egypt","Faculty of Science, Menoufia University, Shibin El Kom","School of Information Technology and Computer Science, Nile University, Sheikh Zayed"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Menoufia University, Shibin El Kom, Egypt","institution_ids":["https://openalex.org/I63601056"]},{"raw_affiliation_string":"School of Information Technology and Computer Science, Nile University, Sheikh Zayed, Egypt","institution_ids":["https://openalex.org/I57629906"]},{"raw_affiliation_string":"Faculty of Science, Menoufia University, Shibin El Kom","institution_ids":["https://openalex.org/I63601056"]},{"raw_affiliation_string":"School of Information Technology and Computer Science, Nile University, Sheikh Zayed","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040756967","display_name":"Amr F. Shawish","orcid":"https://orcid.org/0000-0002-2419-8643"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Amr F. Shawish","raw_affiliation_strings":["Faculty of Science, Menoufia University, Shibin El Kom, Egypt","Faculty of Science, Menoufia University, Shibin El Kom"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Menoufia University, Shibin El Kom, Egypt","institution_ids":["https://openalex.org/I63601056"]},{"raw_affiliation_string":"Faculty of Science, Menoufia University, Shibin El Kom","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101341768","display_name":"Mohamed A. Amin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120363","display_name":"Higher Institute of Engineering","ror":"https://ror.org/02pyw9g57","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210120363"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Mohamed A. Amin","raw_affiliation_strings":["EL Madina Higher Instute of Admininstration and Technology, Giza, Egypt","EL Madina Higher Instute of Admininstration and Technology, Giza"],"affiliations":[{"raw_affiliation_string":"EL Madina Higher Instute of Admininstration and Technology, Giza, Egypt","institution_ids":["https://openalex.org/I4210120363"]},{"raw_affiliation_string":"EL Madina Higher Instute of Admininstration and Technology, Giza","institution_ids":["https://openalex.org/I4210120363"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069912097","display_name":"Ismail M. Hagag","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120363","display_name":"Higher Institute of Engineering","ror":"https://ror.org/02pyw9g57","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210120363"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ismail M. Hagag","raw_affiliation_strings":["EL Madina Higher Instute of Admininstration and Technology, Giza, Egypt","EL Madina Higher Instute of Admininstration and Technology, Giza"],"affiliations":[{"raw_affiliation_string":"EL Madina Higher Instute of Admininstration and Technology, Giza, Egypt","institution_ids":["https://openalex.org/I4210120363"]},{"raw_affiliation_string":"EL Madina Higher Instute of Admininstration and Technology, Giza","institution_ids":["https://openalex.org/I4210120363"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040756967"],"corresponding_institution_ids":["https://openalex.org/I63601056"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":7.0967,"has_fulltext":true,"cited_by_count":34,"citation_normalized_percentile":{"value":0.97062608,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"2021","issue":"1","first_page":"8113253","last_page":"8113253"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8626772165298462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7820554971694946},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7358946800231934},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6715736389160156},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5889669060707092},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5563534498214722},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5154619812965393},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5125446319580078},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4924064874649048},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4821319580078125},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.28152748942375183},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10028937458992004},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08843067288398743}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8626772165298462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7820554971694946},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7358946800231934},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6715736389160156},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5889669060707092},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5563534498214722},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5154619812965393},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5125446319580078},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4924064874649048},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4821319580078125},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.28152748942375183},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10028937458992004},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08843067288398743}],"mesh":[{"descriptor_ui":"D000067917","descriptor_name":"Cloud Computing","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000067917","descriptor_name":"Cloud Computing","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000067917","descriptor_name":"Cloud Computing","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016247","descriptor_name":"Information Storage and Retrieval","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016247","descriptor_name":"Information Storage and Retrieval","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016247","descriptor_name":"Information Storage and Retrieval","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false}],"locations_count":3,"locations":[{"id":"doi:10.1155/2021/8113253","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8113253","pdf_url":"https://downloads.hindawi.com/journals/cin/2021/8113253.pdf","source":{"id":"https://openalex.org/S72372694","display_name":"Computational Intelligence and Neuroscience","issn_l":"1687-5265","issn":["1687-5265","1687-5273"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational Intelligence and Neuroscience","raw_type":"journal-article"},{"id":"pmid:35646109","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/35646109","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational intelligence and neuroscience","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:9135553","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/9135553","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Comput Intell Neurosci","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1155/2021/8113253","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8113253","pdf_url":"https://downloads.hindawi.com/journals/cin/2021/8113253.pdf","source":{"id":"https://openalex.org/S72372694","display_name":"Computational Intelligence and Neuroscience","issn_l":"1687-5265","issn":["1687-5265","1687-5273"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational Intelligence and Neuroscience","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3217286080.pdf","grobid_xml":"https://content.openalex.org/works/W3217286080.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W2039541634","https://openalex.org/W2061840562","https://openalex.org/W2088546540","https://openalex.org/W2096515701","https://openalex.org/W2108072891","https://openalex.org/W2167015470","https://openalex.org/W2185492908","https://openalex.org/W2589096605","https://openalex.org/W2789760348","https://openalex.org/W2790867243","https://openalex.org/W2884206483","https://openalex.org/W2888391740","https://openalex.org/W2901225893","https://openalex.org/W2901900557","https://openalex.org/W2923786003","https://openalex.org/W2940547375","https://openalex.org/W2945353313","https://openalex.org/W2946789804","https://openalex.org/W2992473721","https://openalex.org/W3007489583","https://openalex.org/W3030797541","https://openalex.org/W3088710978","https://openalex.org/W3107184047","https://openalex.org/W3116169147","https://openalex.org/W3124312715","https://openalex.org/W3127643186","https://openalex.org/W3138547989","https://openalex.org/W3204259092","https://openalex.org/W6753420203"],"related_works":["https://openalex.org/W137222638","https://openalex.org/W2008702788","https://openalex.org/W4200386038","https://openalex.org/W4309713563","https://openalex.org/W2389620320","https://openalex.org/W3171772491","https://openalex.org/W2733803478","https://openalex.org/W2554599470","https://openalex.org/W2022352978","https://openalex.org/W4210893852"],"abstract_inverted_index":{"The":[0,53],"main":[1,192],"goal":[2,193],"of":[3,63,85,103,126,134,137,147,194,231],"any":[4,30,70,180,217],"data":[5,13,32,47,67,113,138,148,182,214,252,259],"storage":[6,33],"model":[7,34,49,55,120,157,175,227,233],"on":[8,152],"the":[9,51,83,86,107,116,122,135,140,153,159,177,191,199,222,232,244,262],"cloud":[10,31,64,96,129,154,163,195],"is":[11,25],"accessing":[12],"in":[14,29,115,128,139,261],"an":[15],"easy":[16],"way":[17],"without":[18],"risking":[19],"its":[20],"security.":[21],"A":[22],"security":[23,61,84,100,127,144,160,245],"consideration":[24],"a":[26,45,57,75,204,229],"major":[27],"aspect":[28],"to":[35,59,210,221],"provide":[36],"safety":[37],"and":[38,72,93,101,109,124,145,168,171,207,213,251,257],"efficiency.":[39],"In":[40],"this":[41,174],"paper,":[42],"we":[43],"propose":[44],"secure":[46],"protection":[48,68,73,246],"over":[50,162],"cloud.":[52,87,117,141,223,263],"proposed":[54,119],"presents":[56,106],"solution":[58],"some":[60],"issues":[62,92],"such":[65,131,165],"as":[66,132,166,203],"from":[69,74,179,216,254],"violations":[71],"fake":[76,181,218,255,258],"authorized":[77],"identity":[78],"user,":[79],"which":[80],"adversely":[81],"affects":[82],"This":[88],"paper":[89],"includes":[90],"multiple":[91],"challenges":[94],"with":[95],"computing":[97,130,164],"that":[98,111,188],"impairs":[99],"privacy":[102],"data.":[104],"It":[105,142],"threats":[108],"attacks":[110],"affect":[112],"residing":[114],"Our":[118,156],"provides":[121,143],"benefits":[123],"effectiveness":[125],"enhancement":[133],"encryption":[136],"scalability":[146],"sharing":[149],"for":[150,248],"users":[151,212],"computing.":[155],"achieves":[158],"functions":[161],"identification":[167],"authentication,":[169],"authorization,":[170],"encryption.":[172],"Also,":[173],"protects":[176],"system":[178],"owner":[183,253,260],"who":[184],"enters":[185],"malicious":[186],"information":[187],"may":[189],"destroy":[190],"services.":[196],"We":[197,224],"develop":[198],"one-time":[200],"password":[201],"(OTP)":[202],"logging":[205],"technique":[206,209],"uploading":[208],"protect":[211],"owners":[215],"unauthorized":[219],"access":[220],"implement":[225],"our":[226],"using":[228],"simulation":[230],"called":[234],"Next":[235],"Generation":[236],"Secure":[237],"Cloud":[238],"Server":[239],"(NG-Cloud).":[240],"These":[241],"results":[242],"increase":[243],"techniques":[247],"end":[249],"user":[250,256]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
