scispace - formally typeset
Search or ask a question
Author

Dhurate Hyseni

Bio: Dhurate Hyseni is an academic researcher from South East European University. The author has contributed to research in topics: Cloud computing & Encryption. The author has an hindex of 2, co-authored 9 publications receiving 14 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization is proposed, based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality.
Abstract: There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest, which comes with its own difficulties such as efficient key management, access permissions and similar. In this paper, we propose a new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization. The approach is based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents. Also, we will present each strategy with the results and comments related to the realized measurements.

9 citations

Proceedings ArticleDOI
14 Jun 2015
TL;DR: The aim of this work is to provide a logical view for a proposed model in cloud, where the main role in selecting the level of security falls to the end user.
Abstract: Cloud environment offers a great possibility in computing, it is immensely helpful to all parties, enables quick access to data and space usage is based on the needs. In this context public data is exposed to other parties for different purposes but private data must be protected when used in different operations in order to have a secure environment. The aim of this work is to provide a logical view for a proposed model in cloud, where the main role in selecting the level of security falls to the end user. In the proposed model by end user we refer to IT administrator of a particular organization which is informed about all statistics our model offer. Therefore the end user is aware of the main parameters which are related to the cloud security. After selecting the level of security the entire communication continues on the same level, for each member of that organization.

8 citations

Proceedings ArticleDOI
10 Jun 2019
TL;DR: The conclusions of this paper are that user has a weighty impact on improving information systems, and application designers/developers should consider many factors when implementing an application that would be used by different categories of stakeholders.
Abstract: Information systems are one of the biggest crucial elements in today's education institutions. Nowadays, institutions are constantly under pressure to digitalize most of their processes. In order to improve information systems, or to have qualitative information systems, it is essential to have evaluation of application accordingly from users' perspective. This research offers an evaluation from user perspective of e-services dedicated to the education area. EMIS system was chosen as a case study. This system has been evaluated based on DeLone and McLean's information system success model. This paper is a quantitative study, and it uses all DeLone and McLean's variables to develop and validate measurement model of education information systems success, which has an impact specifically in the administrating process. The conclusions of this paper are that user has a weighty impact on improving information systems. Furthermore, application designers/developers should consider many factors when implementing an application that would be used by different categories of stakeholders.

3 citations

Proceedings ArticleDOI
01 Sep 2017
TL;DR: A cloud-based model for security management, previously proposed in research, is implemented and the strategy of implementation is shown to increase security in cloud based on the partition and encryption of data under various models, and sending them to the cloud.
Abstract: In many research results today, the encryption of data at rest is considered to be one of the main issues related to security in cloud computing and especially cloud storage. Based on result from survey and the need for enterprise-wide strategies for data encryption, we have implemented a cloud-based model for security management, previously proposed in our research. We integrate in our strategy specific elements such as the way of saving data to the cloud, possible attacks on data. In addition, based on these elements we have analyzed the level of support of the proposed model for security in cloud. Every analysis made, proves a possibility that our proposed model for security in cloud offers and itself, the way of implementation in the proposed model. Also, the strategy of implementation is shown to increase security in cloud based on the partition and encryption of data under various models, and sending them to the cloud. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents.

2 citations

Proceedings ArticleDOI
10 Jun 2018
TL;DR: Two new methods based on some ways of file encryption, partitioning, and distribution among multiple storage providers are proposed, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt.
Abstract: In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient trust in third party cloud providers. To improve the privacy of users and to ensure more secured data we have proposed a model for security in cloud computing, in the previous work [1]. Part of our proposed model is IT Security Specialist (ITSS) of the company i.e. that will control security in cloud computing. This solution is based on some ways of file encryption, partitioning, and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. In this paper we propose two new methods as part of our proposed model [1,2]. Based on the results of this work, we provide the comments in relations to the methods as a part of the proposed model of security in the cloud computing.

1 citations


Cited by
More filters
Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations

Proceedings ArticleDOI
01 Jan 2016
TL;DR: This paper proposes a novel authentication mechanism, called Hybrid Multilevel Authentication, which provides the security against the insider attacks and virtualization attacks, and is implemented by symmetry-based AES encryption algorithm.
Abstract: Cloud Computing is the ubiquitous model of a shared pool of configurable computing resources. This paper proposes a multilevel authentication technique for use in Private Cloud network. Authentication of User is a challenging issue due to increasing security threats as it acts as the first defence against attackers. Whole authentication control lies in the server Side so Single-tier authentication is not enough to overcome these problems. We come up with a novel authentication mechanism, called Hybrid Multilevel Authentication, which provides the security against the insider attacks and virtualization attacks. Positives and negatives of other cloud setup were considered. Encryption function is implemented by symmetry-based AES encryption algorithm. This model provides a level of security for each member of that organisation.

38 citations

Journal ArticleDOI
01 Jan 2022
TL;DR: In this paper , a solution that provides reliable and protected authentication and authorization service in cloud environments is described, where multi-agents are used to represent Open-Identity (ID) design to find a solution.
Abstract: Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system’s virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper. With the help of multi-agents, we attempt to represent Open-Identity (ID) design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud. This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner. Based on attack-oriented threat model security, the evaluation works. By considering security for both authentication and authorization systems, possible security threats are analyzed by the proposed security systems.

12 citations

Journal ArticleDOI
TL;DR: A new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization is proposed, based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality.
Abstract: There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest, which comes with its own difficulties such as efficient key management, access permissions and similar. In this paper, we propose a new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization. The approach is based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents. Also, we will present each strategy with the results and comments related to the realized measurements.

9 citations