With the rise in demand for cloud services, most companies attempt to provide a lot of cloud services and benefit from them, one of the most important services is accounting the cost of data ciphering in the clouds market. This proposed work proved that the cryptographic keys are variable as evident mathematically, which in turn makes it difficult to guess the decoding of the data, and extends the cloud security model by generating both private and public keys based on local cost and trend line rules respectively. Due to the increased decoding time as evident from the proof results, the suitable security level is implemented and tested using Symmetric and Asymmetric encryption algorithms.
K. Khorsheed, N., A. El-Dosuky, M., T. Hamza, T., & Z. Rashad, M. (2017). Data Security Evaluation Based on Trend Line Rules Model. Mansoura Journal for Computer and Information Sciences, 13(1), 37-41. doi: 10.21608/mjcis.2017.311960
MLA
Nazar K. Khorsheed; Mohammad A. El-Dosuky; Taher T. Hamza; Magdi Z. Rashad. "Data Security Evaluation Based on Trend Line Rules Model", Mansoura Journal for Computer and Information Sciences, 13, 1, 2017, 37-41. doi: 10.21608/mjcis.2017.311960
HARVARD
K. Khorsheed, N., A. El-Dosuky, M., T. Hamza, T., Z. Rashad, M. (2017). 'Data Security Evaluation Based on Trend Line Rules Model', Mansoura Journal for Computer and Information Sciences, 13(1), pp. 37-41. doi: 10.21608/mjcis.2017.311960
VANCOUVER
K. Khorsheed, N., A. El-Dosuky, M., T. Hamza, T., Z. Rashad, M. Data Security Evaluation Based on Trend Line Rules Model. Mansoura Journal for Computer and Information Sciences, 2017; 13(1): 37-41. doi: 10.21608/mjcis.2017.311960