Wid Alaa Jebbar

Work place: Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Nasiriyah 64001, Iraq

E-mail: widalaa.23co4@utq.edu.iq

Website:

Research Interests:

Biography

Wid Alaa Jebbar: She received her bachelor's degree in cybersecurity in Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Iraq, in 2014. The theme of the bachelor's thesis is devoted to the study of wireless sensor network security. She is currently studying a master's program at Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Iraq. Her research topics is all about the security of Blockchain system in terms of loans and money transaction.

Author Articles
Sturdy Blockchain Combined with E-apps Repositories Based on Reliable Camouflaging and Integrating Mechanisms

By Rasha Hallem Razzaq Duaa Hammoud Tahayur Wid Alaa Jebbar Mishall Al-Zubaidie

DOI: https://doi.org/10.5815/ijcnis.2025.03.03, Pub. Date: 8 Jun. 2025

The development of technology around us is going through a rapid and significant state that is almost causing a technological revolution, so one of the most important problems facing us in the current technological era is the management of warehouse data and the growth occurring in the volume of data that is dealt with on a daily basis, whether in terms of its storage or security, especially if the data is huge and large. Therefore, we developed a proposed model in our study that provides security in addition to storage/warehouse management. In our proposed model, the El-Gamal and GLUON functions address the security problem. In addition to supporting other security methods, such as GLUON, which is secure and fast, for encryption. Hybrid Blockchain technology is used in our proposed model to deal with the storage of this type of huge data, and also for the purpose of organizing warehouse storage. Data is exposed to intrusion or loss when using any traditional, centralized technology or when storing it in databases, so we chose the hybrid Blockchain to be an integrated fit with our proposed model, and also because it allows the distribution of data across public and private domains. Our proposed model, upon examination, shows that it effectively dealt with defending against attacks such as NotPetya, GoldenEye, WannaCry, Emotet, Trickbot, Conti, and DarkSide. In addition, the results of lightweight GLUON and El-Gamal showed that the performance analysis of our model was very successful, where the time it takes to create a block was between 0.01 ns and not more than 0.09 ns which is considered too fast for such a system that deals with a big data. As a result, we were able to gain an effective model for data repository control, security, performance, and management. 

[...] Read more.
Other Articles