The use of search engines is the most common way of finding the information. This means that less visible contents (for search engines) are increasingly difficult or even almost impossible to find. Thus, Web users are forced to accept alternative services or contents only because they are visible and offered to users by search engines..Therefore, it is fundamental to assure that one's Web site will be indexed and, consequently, visible and accessible to as many Web users as possible. The websites are the most useful platform to disseminate Quran knowledge and information. The most important website that Muslims interact with is the Holy Quran websites. Higher quality websites tend to attract more links and rendered those websites as highly visible. In this study softwares like Seoquak, Alexa, AChecker is applied to evaluate the visibility and accessibility of Quran Web Portals/websites. Eight Quran Websites/WebPortals were investigated. It was found that the website Quranexplorer.com has drawn a Top traffic ranking among eight selected websites. It is futile to have a website that is difficult to access by users owing to non compliance with the Web Content Accessibility Guidelines..The software like AChecker is able to examine the Al-Quran websites for barriers to accessibility. Applying AChecker to the 8 Quranic websites it was found that the website, namely the Altafsir.com top the list in terms of the most number of errors in their website.
Cloud security vulnerabilities Advanced encryption standard IAAS SAAS PAAS Cloud computing security technique. Cloud computing is the revolution and solution to the computing world which has paid further attention as an emerging network storage technology. Cloud computing has enormous adaptability in terms of demand or availability of resources. The organization prefers cloud storage services to reduce the overhead of storing data locally. Yet, Data security and privacy are the major issues in cloud computing. Although security is still one of the critical challenges in the world of cloud computing. The security concerns comprise the loss of vital information and privacy loss of any individual who uses cloud networking. This research reviews the cloud Security, its vulnerabilities and proposes a three-layer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES. According to our research, this model is one of the most compact encryption which consumes less storage space with short calculation time. A detailed review of cloud security concerns and resolutions has been discussed in this paper. Contribution/Originality: This research reviews the cloud Security, its vulnerabilities and proposes a threelayer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES. the 3 layer infrastructure concept such as; SAAS (Software as a Service), IAAS (Infrastructure as a Service) and PAAS (Platform as a Service) [8, 9] as shown in Figure 1.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.