<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="Research Article" dtd-version="1.0"><front><journal-meta><journal-id journal-id-type="pmc">srjecs</journal-id><journal-id journal-id-type="pubmed">SRJECS</journal-id><journal-id journal-id-type="publisher">SRJECS</journal-id><issn>2788-9408</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.47310/srjecs.2025.v05i01.002</article-id><title-group><article-title>A New Technique To Prevent Hacks Through Key Logger And Cookies Hijack In Cloud Computing</article-title></title-group><contrib-group><contrib contrib-type="author"><name><given-names>KhalidKhalis</given-names><surname>Ibrahim</surname></name></contrib><xref ref-type="aff" rid="aff-a" /></contrib-group><contrib-group><contrib contrib-type="author"><name><given-names>LuayIbrahim</given-names><surname>khalaf</surname></name></contrib><xref ref-type="aff" rid="aff-a" /></contrib-group><contrib-group><contrib contrib-type="author"><name><given-names>MohammedBasim</given-names><surname>Omar</surname></name></contrib><xref ref-type="aff" rid="aff-a" /></contrib-group><aff-id id="aff-a">Department of Computer Science, College of Computer Science and Mathematics, Tikrit University, Tikrit, Iraq.</aff-id><abstract>Cloud computing has made internet communication and data sharing easier and more flexible since the user can access stored data from any place and manage applications on different platforms, without having to worry about hardware failure or maintenance. A Cloud Service provider (CSP) should ensure the security of data transactions and verify logged-on users to encourage people to adopt cloud computing services without worrying about their confidential data. Several approaches were developed to ensure the security of the data itself and the security of data transactions.The proposed system in this research is concerned with cases where the cookie file that contains users’ credentials gets hijacked, and the hacker gets unauthorized access to users’ data. The proposed system employs encryption of the user’s device's MAC address with other attributes using the famous and reliable RSA encryption technique. Testing the system shows that hijacking the cookie file would be useless to the hacker under this technique, and no authorization is granted.</abstract></article-meta></front><body /><back /></article>