A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data

العناوين الأخرى

طريقة ثلاثية التجزئة لحماية سرية البيانات المتنقلة الخارجة إلى السحابة

مقدم أطروحة جامعية

al-Tala, Rana Husayn Mahmud

مشرف أطروحة جامعية

Barakah, Ribhi Sulayman

أعضاء اللجنة

Khattab, Sharif Isam al-Din
Barhum, Tawfiq Sulayman

الجامعة

الجامعة الإسلامية

الكلية

كلية تكنولوجيا المعلومات

دولة الجامعة

فلسطين (قطاع غزة)

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2015

الملخص الإنجليزي

Despite the increasing dependency on smart phones and mobile data-sensitive applications, these devices have limited storage and processing capabilities.

They operate in unreliable environments leading to possible loss of valuable data, if not properly managed.

Mobile data outsourcing through the cloud allows users to send their potentially sensitive data to external servers that become responsible for their storage, management, and dissemination.

However, such cloud outsourcing may lead to violation of privacy if the network/server cannot be fully trusted.

While encrypting the data prior to sending appears to be a solution for this problem, this is computationally intensive and infeasible in the case of mobile devices.

In this thesis, we develop a confidentiality protection approach for cloud out-sourcing of mobile data.

It performs encryption for partial data that takes into account both the confidentiality constraints of the data being collected and the limitations of the mobile devices.

Our approach employs hybrid fragmentation (vertical and horizontal fragmentation) to determine those parts that need to be encrypted and those that can be sent in clear, also those that should be stored at the owner's side.

We provide an implementation of the confidentiality protection approach.

The implantation is basically based on the architecture of the approach and realizes the confidentiality constraints specified as a basis for the data partitioning.

We present an evaluation to the confidentiality approach to show its ability to satisfy the constraints imposed on the injury and martyr data and used to fragment these data as defined by the approach.

We perform a number of tests to check if the data is fragmented and uploaded to the cloud as required and within the required time.

Additionally we compare our approach to a similar approach to show that ours outperforms the other approach in satisfying the confidentiality constraints taking less space and time.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

عدد الصفحات

76

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Related works.

Chapter Three : Theoretical foundation.

Chapter Four : The proposed protection approach.

Chapter Five : Implementation of the confidentiality protection approach.

Chapter Six : Evaluation.

Chapter Seven : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Tala, Rana Husayn Mahmud. (2015). A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688772

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Tala, Rana Husayn Mahmud. A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University. (2015).
https://search.emarefa.net/detail/BIM-688772

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Tala, Rana Husayn Mahmud. (2015). A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688772

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-688772