Ibrahim Yasser

Work place: Mansoura University / Communication and Electronics Engineering Department, Mansoura, 35516, Egypt

E-mail: ibrahimyasser14@gmail.com

Website: https://orcid.org/0000-0001-5411-2567

Research Interests: Medical Informatics, Computer systems and computational processes, Artificial Intelligence, Medical Image Computing, Data Mining, Multimedia Information System, Data Structures and Algorithms,


Ibrahim Yasser received the B.Sc. degree in electronics and communications from Benha University, Egypt, and the M.Sc. and Ph.D. degrees from the Electronics and Communications Engineering Department, Mansoura University, Egypt, in 2016 and 2020, respectively. His research work has been materialized in books and ISI index articles in international specialty journals. His research interests include neutrosophic sets, security, multimedia, fog and cloud computing, chaotic maps, machine learning, big data, artificial intelligent, medical image analysis, computer-aided diagnosis, and flexible education. Future research interests include design security techniques for the cloud requiring little user awareness and computer-aided diagnosis medical images analysis. He is a member of chief editors for Neutrosophic Knowledge journal.

Author Articles
Privacy Enhancing for Fog Computing based - IoT

By Samaa Y. Tarabay Ibrahim Yasser Ahmed S. Samrah Abeer T. Khalil

DOI: https://doi.org/10.5815/ijwmt.2023.03.01, Pub. Date: 8 Jun. 2023

With the massive inflation of newly developed technologies, recourse to data has become a necessity in light of the current inflation and excessive need dominating the world and developed societies. According to the control of millions of smart devices and sensors connected to an interconnected and controlled automated system within installed scales due to the services provided by IOT devices through the created fog layer that connects the cloud centers and those devices, in addition, very large amounts of that data including public and private are passed through the connection of Internet of Things devices to each other. Smart and advanced networks as one of the fog computing applications play a prominent and accurate role in the infrastructure for reliable and sound data transmission. Accordingly, the process of data aggregation is an important and common matter in the world of fog-enhancing Internet of Things, so preserving the privacy of that data is a matter of concern, and based on this principle, we propose in this paper a model for data aggregation that maintains privacy using a foggy computing environment called PPFDA (privacy preserving based- fog computing data aggregation). We use in our scheme DF homomorphic cryptosystem as it consider one of the aggregation models that ensures the privacy purpose. The theoretical results and analyzes show that our design is ensuring the privacy of data during collection using an algorithm of DF. The results confirm that the proposed scheme achieves security and privacy purposes in modern network systems for the Internet of things based in fog computing. In addition, it contributes significantly to the efficient performance of storage operations.

[...] Read more.
A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing

By Samaa Y. Tarabay Abeer Twakol Ahmed S. Samrah Ibrahim Yasser

DOI: https://doi.org/10.5815/ijcnis.2023.01.06, Pub. Date: 8 Feb. 2023

The huge availability and prosperity of net technology results in raised on-line media sharing over the cloud platform which has become one of the important resources and tools for development in our societies. So, in the epoch of enormous data great amount of sensitive information and transmission of different media transmitted over the net for communication. And recently, fog computing has captured the world's attention due to their inherent features relevant compared to the cloud domain, But this push to head for many issues related to data security and privacy in fog computing which it's still under studied in their initial juncture. Therefore, in this paper, we will review a security system that relies on encryption as a kind of effective solution to secure image data. We use an approach of using chaotic map plus space curve techniques moreover the confusion and diffusion strategies are carried out utilizing Hilbert curvature and chaotic map such as two-dimensional Henon map (2D-HM) to assert image confusion with pixel level permutation .Also we relied in our system the way of shuffling the image with blocks and use a key for each block, which is chooses randomly to have a high degree of security. The efficiency of the proposed technique has been tested utilizing different investigations like analysis of entropy [7.9993], NPCR [99.6908%] and finally UACI [33.6247%]. Analysis of results revealed that the proposed system of image encryption technique has favorable effects, and can achieve a good results moreover it fights different attacks and by comparing with another techniques denote that our proposed fulfills high security level with high quality.

[...] Read more.
Other Articles