{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T08:48:45Z","timestamp":1771058925720,"version":"3.50.1"},"reference-count":30,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"vor","delay-in-days":327,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one\u2010time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG\u2010Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.<\/jats:p>","DOI":"10.1155\/2021\/8113253","type":"journal-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T23:35:52Z","timestamp":1637796952000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A New Secure Model for Data Protection over Cloud Computing"],"prefix":"10.1155","volume":"2021","author":[{"given":"Amr M.","family":"Sauber","sequence":"first","affiliation":[]},{"given":"Passent M.","family":"El-Kafrawy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2419-8643","authenticated-orcid":false,"given":"Amr F.","family":"Shawish","sequence":"additional","affiliation":[]},{"given":"Mohamed A.","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Ismail M.","family":"Hagag","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,11,24]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019070104"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019040105"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019010105"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019040103"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862221500044"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019010101"},{"key":"e_1_2_9_7_2","doi-asserted-by":"crossref","unstructured":"ElKafrawyP. M. SauberA. M. andHafezA. M. HDFSX: big data distributed file system with small files support Proceedings of the 2016 12th International Computer Engineering Conference (ICENCO) December 2016 Cairo Egypt https:\/\/doi.org\/10.1109\/icenco.2016.7856457 2-s2.0-85016017986.","DOI":"10.1109\/ICENCO.2016.7856457"},{"key":"e_1_2_9_8_2","first-page":"247","article-title":"Cloud computing security issues and challenges","volume":"3","author":"Kuyoro S. O.","year":"2011","journal-title":"International Journal of Computer Networks"},{"key":"e_1_2_9_9_2","doi-asserted-by":"crossref","unstructured":"El KafrawyP. M. SauberA. M. HafezM. M. andShawishA. F. HDFSx: an enhanced model to handle small files in hadoop with a simulating toolkit Proceedings of the 2018 1st International Conference on Computer Applications & Information Security (ICCAIS) April 2018 Riyadh Saudi Arabia https:\/\/doi.org\/10.1109\/cais.2018.8442036 2-s2.0-85053516402.","DOI":"10.1109\/CAIS.2018.8442036"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20113108"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120754"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2013.5306"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.002"},{"key":"e_1_2_9_14_2","article-title":"Anonymous data sharing scheme for dynamic groups in an untrusted cloud","volume":"2","author":"Lavanya P.","year":"2014","journal-title":"IPASJ International Journal Of Computer Science (IIJCS)"},{"key":"e_1_2_9_15_2","doi-asserted-by":"crossref","unstructured":"PrasadP. OjhaB. ShahiR. R. andLalR 3-Dimensional security in cloud computing Proceedings of the 2011 3rd International Conference On Computer Research and Development (ICCRD) March 2011 Shanghai China https:\/\/doi.org\/10.1109\/iccrd.2011.5764279 2-s2.0-79957556040.","DOI":"10.1109\/ICCRD.2011.5764279"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.07.007"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"WangC. WangQ. RenK. andLouW Ensuring data storage security in cloud Computing in quality of service 1\u20139 Proceedings of the WQOS IEEE 17th international workshop July 2009 Charleston SC USA.","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"e_1_2_9_18_2","unstructured":"KumarS. Abbas JafriS. A. NigamN. A. GuptaN. GuptaG. andSinghS. K. A new user identity based authentication using security and distributed for cloud computing 748 Proceedings of the International Conference on Mechanical and Energy Technologies (ICMET 2019) November 2019 Galgotias College of Engineering and Technology Greater Noida UP India."},{"key":"e_1_2_9_19_2","doi-asserted-by":"crossref","unstructured":"BethencourtJ. SahaiA. andWatersB. Ciphert ext-policy attribute-based encryption Proceedings of the IEEE Symposium on Security and Privacy (SP) May 2007 Oakland California USA 321\u2013334.","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_2_9_20_2","unstructured":"ShamirA. Identity-based crypto systems and signature schemes Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques August 1985 Santa Barbara CA USA 47\u201353."},{"key":"e_1_2_9_21_2","first-page":"34894","article-title":"Privacy and security issues IN cloud computing","volume":"8","author":"Tarekegn G. B.","year":"2016","journal-title":"International Journal Of Current Research"},{"key":"e_1_2_9_22_2","article-title":"Security threats and legal issues related to cloud based solutions","volume":"18","author":"Alsolami E.","year":"2018","journal-title":"IJCSNS International Journal Of Computer Science And Network Security"},{"key":"e_1_2_9_23_2","doi-asserted-by":"crossref","unstructured":"BasuS. BardhanA. GuptaK. SahaP. PalM. BoseM. BasuK. ChaudhuryS. andSarkarP. Cloud computing security challenges & solutions-A survey Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) January 2018 Las Vegas NV USA https:\/\/doi.org\/10.1109\/ccwc.2018.8301700 2-s2.0-85047401912.","DOI":"10.1109\/CCWC.2018.8301700"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.3045661"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.041"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019070103"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102468"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3042433"},{"key":"e_1_2_9_29_2","doi-asserted-by":"crossref","unstructured":"El-KafrawyP. M. SauberA. M. andKhalilA. Multi-label classification for mining big data Proceedings of the International Conference on Advances in Big Data Analytics December 2015 Hyderabad India https:\/\/doi.org\/10.1109\/access.2018.2799879 2-s2.0-85041415227.","DOI":"10.1109\/ACCESS.2018.2799879"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2799879"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/8113253.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/8113253.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8113253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:59:17Z","timestamp":1722945557000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8113253"}},"subtitle":[],"editor":[{"given":"Ahmed Mostafa","family":"Khalil","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8113253"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8113253","archive":["Portico"],"relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"value":"1687-5265","type":"print"},{"value":"1687-5273","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8113253"}}