Zaid Alaa Hussien

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The cloud is an on-demand service provided to users through the Internet. Security has become one of the key problems in the cloud because of the increasing number of users. Many challenges in cloud security need to be resolved. This work focuses on data integrity as one of these security challenges because when users remotely save their data in a cloud,(More)
Cloud computing is a novel paradigm in informationtechnology. This approach involves methods that forwardservices to users on demand via pay-as-you-go. Cloud computingcan reduce computation and communication costs, and thisadvantage has resulted in the influx of cloud computing users. Cloud storage, which allows users to remotely outsource theirdata to the(More)
A number of image/message document authentication and integrity schemes have been conducted to recognize any modification in the exchange of documents between two entities (sender and receiver) within a cloud environment. Existing solutions are based on combining key-based hash function with traditional factors (steganography, smart-card, timestamp).(More)
Cloud computing is a promising information technology service that allocates and reallocates resources when a client requires virtual data storage and network facility at any time and place. Cloud computing provides large data storage and management services at the lowest cost. Thus, it is crucial for many organizations and clients who seek such services.(More)
Networking has become an essential factor in daily life and activities where the major problem in network security is the safety of the transfer information. The infrastructure for the networking is the TCP/IP suite, and the address resolution protocol is the core part of the standard which maps the logical address into a physical address. Address(More)
Recently, security issues are obstructing the development and using of cloud computing services. Authentication and integrity play an important role in the cloud security, and numerous concerns have been raised to recognize any tampering with exchanges of the image document between two entities (sender and receiver) within the cloud environment. However,(More)
Internet of Things is a new generation of network service platform that allows everyday objects including small devices in sensor networks to be capable of connecting to the internet. Such an innovative technology can lead to positive changes in human life. An e-health service based on the Internet of Things has great potential. The popularity of(More)
Power consumption of routing protocols is one of the main issues that wireless sensor networks (WSNs) encounter in their lifetime. Low-Energy Adaptive Clustering Hierarchy (LEACH) clustering protocol was introduced to reduce power consumption. However, in LEACH, power consumption increases massively as the distance between sink node and cluster heads (CHs)(More)
Outsourced data in cloud and computation results are not always trustworthy because data owners lack physical possession and control over the data as a result of virtualization, replication, and migration techniques. Protecting outsourced data from security threats has become a challenging and potentially formidable task in cloud computing; hence, many(More)