Salah T. Alshammari

ORCID: 0000-0003-4707-4691
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Cloud Computing and Resource Management
  • Access Control and Trust
  • Mobile Agent-Based Network Management
  • Peer-to-Peer Network Technologies
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Security and Verification in Computing

King Saud University
2024

King Abdul Aziz University Hospital
2021

King Abdulaziz University
2021

Cloud data storage is revolutionary because it eliminates the need for additional hardware, which often costly, inconvenient, and requires space. allows owners to store large amounts of in a flexible way at low cost. The number online cloud services their consumers has therefore increased dramatically. However, ensuring privacy security on digital platform challenge. A cryptographic task-role-based access control (T-RBAC) approach can be used protect privacy. This ensures accessibility...

10.3390/sym13030492 article EN Symmetry 2021-03-17

The safety of cloud services within a Trust Model System (TMS) is certainly compromised by lack defense against security threats as well inaccuracy the trust results. Our proposed model addresses well-known to reputation system, and shown deal with all possible potential attack threats, such Sybil, on–off, collusion attacks, specifying identity users tracking activities undertaken them in order easily track unauthorized consumers or attackers provide proof any kind data leakage. TMS can also...

10.1016/j.eij.2021.04.001 article EN cc-by-nc-nd Egyptian Informatics Journal 2021-06-01

Using cloud data storage, large amounts of can be stored by owners in a flexible way and at low cost. Hence, there has been major increase online service providers their users. The privacy security the computing environment is issue. Data ensured using cryptographic access control method, so that only accessed authorized customers while keeping it inaccessible to unauthorized However, this type approach does not address issue trust. An integration between several trust models presented many...

10.1109/access.2021.3132580 article EN cc-by IEEE Access 2021-01-01

Cloud computing is a widely used technology that has changed the way people and organizations store access information. This versatile, extensive amounts of data can be stored in cloud. Businesses various services over cloud without having to install applications. However, are provided public domain, which means both trusted non-trusted users services. Although there number advantages services, especially for business owners, challenges posed terms privacy security information online A...

10.3390/app11188496 article EN cc-by Applied Sciences 2021-09-13

The current paper enlightens the architecture that accounts for mobile agent based on cloud computing. prevalence of computing supports storage extensive data and addresses workload computers in an effective manner. Which allows user to execute queries Cloud Database deployment intensive handles efficient way. However, basic mechanism client-server model has several drawbacks. In this instance, new method by means using agents hence, proposes is highly responsive need users.

10.1109/ncg.2018.8593061 article EN 2018-04-01

The current paper enlightens the architecture that accounts for mobile agent based on cloud computing. prevalence of computing supports storage extensive data and addresses workload computers in an effective manner. Which allows user to execute queries Cloud Database deployment intensive handles efficient way. However, basic mechanism client-server model has several drawbacks. In this instance, new method by means using agents hence, proposes is highly responsive need users.

10.1109/ncg.2018.8593011 article EN 2018-04-01
Coming Soon ...