Visual Cryptography Scheme (VCS) is a scheme for sharing a secret among a set of participants. By using VCS, the image can be encoded into parts or pieces each part or piece is called a share, and each share is given to a participant. In this paper, we proposed a visual cryptography scheme for embedding color secret image into two meaningful covers, and focused on improving the quality of the reconstructed secret by choosing meaningful covers that are close in similarity to the secret image. Experimental results proved that the process of choosing meaningful covers, close in similarity to the secret image, can help in improving almost
Secret sharing, extended visual cryptography scheme, objective image quality measurements, HVS.
Cloud computing has many advantages such as IT resource sharing, excellent scalability, flexibility and high automation level. Because of these advantages, cloud computing is rapidly becoming the Internet technology future. However, the reuse of the software components in cloud computing has been underachieving for many reasons, some of which involve multiple issues, such as the representations of program components, matching of requirements with existing programs, and so on. Software components contain code that can usually be executed only on specific platforms and an interface which supply the unique access to the component.  The code describes the operations that the component will perform when requested and the required input for the component to work correctly. A Software Component as a Service (SCaaS) combines the concept of cloud computing and software reuse. SCaaS delivers software components over the web. A SCaaS user uploads software components to the cloud; then, the SCaaS provider makes these components available on demand typically through a licensing model . As with any cloud service model, SCaaS involves security challenges such as accountability, confidentiality, and integrity. Moreover, because a SCaaS may store user-specific data, it introduces an additional security threat: these components may contain malicious code. In this paper, a cloud that meets the Cloud Security Alliance (CSA) requirements (accountability, confidentiality, and integrity) was built. Also, sandboxing techniques was introduced to testing components before storing them in the cloud. Proxy broadcast re-encryption for securing data in untrusted media was used.
Cloud computing; Security; SCaaS; Threats; Sandboxing, Proxy re-encryption
To help reusing of learning object materials, we need to take a learner’s preference learning style into consideration. It starts from designing the learning materials, which should be capable for adaptation according to learner’ needs. Then, if we do not stick with a certain learning style, and can offer a free learning style, therefore we can increase the motivation for learners, as well as increase the reusing of these learning object materials especially when we provide these learning object materials through cloud infrastructure. By doing that, the effectiveness of reusing learning object materials will be improved. In this paper we build a cloud-based free style learning object material and offer it as a cloud service.
Cloud computing; e-learning; learning object; learning style
In component-based software development (CBSD) approach, the searching and retrieving of accurate reusable software components that are stored in large, distributed and heterogeneous-structured repositories is a tedious and time-consuming process. Current research on Clustering Software Components for efficient component retrieval point to the creation of software component on cloud computing, which allows reuse to occur at large scale. Although search mechanisms play a very important role in cloud computing, This paper presents a survey of the main research on Clustering Software Components, and discusses how should be a mechanism to efficiently search components, in order to offer support for future software components as a service through cloud computing.
software components, reusable, retrieval, Clustering, cloud computing
Recently the web services have been used in most business applications and it’s not just a fad. The shift from traditional software models to the Internet has become a real fact, so the security of data transfer in web services is very important for its survival in which we need to secure it from hacking threats. The brute force attack is considered as one of these threats in which the attacker guesses identity and/or credentials through the use of brute force, but we can avoid this vulnerability by using a strong authentication technique like multi-dimension authentication in which the client authentication not only comprises from username and password but also it will include another factors like one time password, hardware identity and time and the authentication process will be completed by multi-stage that is considered the steps for authentication.
Web service, Security, Multi-Dimension Authentication, Multifactor Authentication