{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:42Z","timestamp":1755907722021,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,18]]},"DOI":"10.1145\/3603273.3634712","type":"proceedings-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T18:12:40Z","timestamp":1704823960000},"page":"374-379","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Security Enhancement in Cloud Computing by Proposing A DKE Encryption Protocol"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9782-4820","authenticated-orcid":false,"given":"Sahar","family":"Ebadinezhad","sequence":"first","affiliation":[{"name":"Department of Computer Information Systems, Near East University, North Cyprus and \rComputer Information Systems Research and Technology Center (CISRT), Near East University, North Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5220-7675","authenticated-orcid":false,"given":"Halmat Ayub","family":"Abdulmajed","sequence":"additional","affiliation":[{"name":"Dept. Engineering and Computer Systems, Lebanese French University (LFU), Iraq"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"NIST","author":"Sokol A. W.","year":"2013","unstructured":"Sokol, A. W., & Hogan, M. D, Nist cloud computing standards roadmap, Special Publication 500-291, NIST, Gaithersburg, MD, p.1-113, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"breaking codes: Introduction to cryptology","author":"Garrett P.B.","year":"2000","unstructured":"Garrett, P.B., Making, breaking codes: Introduction to cryptology, Prentice Hall PTR, Aug 1, 2000."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FGCT.2016.7605062"},{"key":"e_1_3_2_1_4_1","first-page":"396","volume-title":"International Journal of Latest Trends in Engineering and Technology (IJLTET), 3(3)","author":"Kumar A.","year":"2014","unstructured":"Kumar, A., A Comparison of Security Challenges in Public and Private Clouds, International Journal of Latest Trends in Engineering and Technology (IJLTET), 3(3), pp. 396-402, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2010.19"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.86"},{"key":"e_1_3_2_1_7_1","volume-title":"A framework to secure medical image storage in cloud computing environment,\u00a0Journal of Electronic Commerce in Organizations (JECO),\u00a016(1), 1-16","author":"Marwan M.","year":"2018","unstructured":"Marwan, M., Kartit, A., & Ouahmane, H. A framework to secure medical image storage in cloud computing environment,\u00a0Journal of Electronic Commerce in Organizations (JECO),\u00a016(1), 1-16, 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"An improved security framework for cloud environment using ECC algorithm,\u00a0International Journal for Research in Applied Science & Engineering Technology,\u00a06(1)","author":"Silki J.","year":"2018","unstructured":"Silki, J., & Abhilasha, V., An improved security framework for cloud environment using ECC algorithm,\u00a0International Journal for Research in Applied Science & Engineering Technology,\u00a06(1), 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"A Security Framework for Cloud Data Storage (CDS) Based on Agent. In\u00a0Proceedings of the Computational Methods in Systems and Software\u00a0(pp. 62-73)","author":"Arki O.","year":"2017","unstructured":"Arki, O., & Zitouni, A., A Security Framework for Cloud Data Storage (CDS) Based on Agent. In\u00a0Proceedings of the Computational Methods in Systems and Software\u00a0(pp. 62-73). Springer, Cham, September, 2017."},{"key":"e_1_3_2_1_10_1","volume-title":"Dynamic and secure unstructured data sharing in multi-cloud storage using the hybrid crypto-system.\u00a0International Journal of Advanced and Applied Sciences,\u00a05(1), 15-23","author":"Subramanian K.","year":"2018","unstructured":"Subramanian, K., John, F. L., & John, F. L., Dynamic and secure unstructured data sharing in multi-cloud storage using the hybrid crypto-system.\u00a0International Journal of Advanced and Applied Sciences,\u00a05(1), 15-23, 2018."},{"key":"e_1_3_2_1_11_1","volume-title":"Quality based cloud service broker for optimal cloud service provider selection,\u00a0International Journal of Applied Engineering Research,\u00a012(18), 7962-7975","author":"Khurana R.","year":"2017","unstructured":"Khurana, R., & Bawa, R. K., Quality based cloud service broker for optimal cloud service provider selection,\u00a0International Journal of Applied Engineering Research,\u00a012(18), 7962-7975, 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"An image encryption method based on chaos system and AES algorithm,\u00a0The Journal of Supercomputing,\u00a075(10), 6663-6682","author":"Arab A.","year":"2019","unstructured":"Arab, A., Rostami, M. J., & Ghavami, B., An image encryption method based on chaos system and AES algorithm,\u00a0The Journal of Supercomputing,\u00a075(10), 6663-6682, 2019."},{"key":"e_1_3_2_1_13_1","volume-title":"Improving the security of cloud computing by building new hybrid cryptography algorithms,\u00a0International Journal of Electronics and Information Engineering,\u00a08(1), 40-48","author":"AbdElminaam D. S.","year":"2018","unstructured":"AbdElminaam, D. S., Improving the security of cloud computing by building new hybrid cryptography algorithms,\u00a0International Journal of Electronics and Information Engineering,\u00a08(1), 40-48, 2018."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICDT.2016.7542076"},{"key":"e_1_3_2_1_15_1","first-page":"2278","author":"Kalpana P.","year":"2012","unstructured":"Kalpana, P., & Singaraju, S., Data security in cloud computing using RSA algorithm,\u00a0International Journal of research in computer and communication technology, IJRCCT, ISSN, 2278-5841, 2012.","journal-title":"ISSN"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"e_1_3_2_1_17_1","volume-title":"Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption,\u00a0IEEE Access,\u00a06, 34051-34074","author":"Xu Q.","year":"2018","unstructured":"Xu, Q., Tan, C., Fan, Z., Zhu, W., Xiao, Y., & Cheng, F., Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption,\u00a0IEEE Access,\u00a06, 34051-34074, 2018."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2014.79"},{"key":"e_1_3_2_1_19_1","volume-title":"PSDS\u2013Proficient Security Over Distributed Storage: A Method for Data Transmission in Cloud,\u00a0IEEE Access,\u00a08, 118285-118298","author":"Shahid F.","year":"2020","unstructured":"Shahid, F., Ashraf, H., Ghani, A., Ghayyur, S. A. K., Shamshirband, S., & Salwana, E., PSDS\u2013Proficient Security Over Distributed Storage: A Method for Data Transmission in Cloud,\u00a0IEEE Access,\u00a08, 118285-118298, 2020."},{"key":"e_1_3_2_1_20_1","volume-title":"Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map,\u00a0IET Image Processing,\u00a014(11), 2310-2320","author":"Zheng J.","year":"2020","unstructured":"Zheng, J., & Liu, L., Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map,\u00a0IET Image Processing,\u00a014(11), 2310-2320, 2020."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983250"},{"key":"e_1_3_2_1_22_1","volume-title":"printed","author":"Security Overview","year":"2015","unstructured":"MCP Security Overview. [online] (accessed 2021, printed 2015). https:\/\/public.support.unisys.com\/framework\/publicterms.aspx?returnurl=%2faseries%2fdocs%2fClearPath-MCP 17.0%2fPDF%2f38347639-008.pdf"}],"event":{"name":"AAIA 2023: 2023 International Conference on Advances in Artificial Intelligence and Applications","acronym":"AAIA 2023","location":"Wuhan China"},"container-title":["Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3634712","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603273.3634712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:35:16Z","timestamp":1755891316000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3634712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":22,"alternative-id":["10.1145\/3603273.3634712","10.1145\/3603273"],"URL":"https:\/\/doi.org\/10.1145\/3603273.3634712","relation":{},"subject":[],"published":{"date-parts":[[2023,11,18]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}