Innovative technique to encrypt data for data mining purposes in cloud computing

Other Title(s)

تقنية مبتكرة لتشفير البيانات لأغراض تنقيب البيانات في الحوسبة السحابية

Dissertant

Khalifah, Amir Hikmat

Thesis advisor

Nasir al-Din, Hibah H. O.

University

Middle East University

Faculty

Faculty of Information Technology

Department

Computer Science Department

University Country

Jordan

Degree

Master

Degree Date

2021

English Abstract

Encryption is inseparable in security world.

Indeed, symmetric algorithm is glowing when speaking about lightweight encryption.

his thesis is evidence that the application of analytic operations in cryptography is not exclusive to other cryptographic techniques.

However, this study does not present itself as being able to perform complete arithmetic operations as in other encryption methods used for this purpose, but by using it, it would be possible to perform analytical operations on encrypted texts as will come later in the whole technique used in this study.

The researcher encrypted the texts row by row using a special simple algorithm consisting of two identical keys, the encryption was done four consecutive times using keys of different lengths each time, and compared the effectiveness of each length by measuring (Avalanche Effect) for each of them, and it was found that the greater the key length is, the more he got a bigger Avalanche Effect, and it's worth noting that he didn't get a suitable (Avalanche Effect) only when using a 256-bit key.

Then he sends the encrypted texts to the cloud and there he uses the "Affinity" correlation rule algorithm on the ciphertexts.

And after all of that he compares the results with the Affinity algorithm when it is applied to the "unencrypted" plaintext on the device not in the cloud.

And it turned out that all the results of the affinity algorithm were identical, in other words, each ciphertext or its index that was used in the affinity algorithm in the cloud is the same unciphered text or its index that was used in the same algorithm in the local device.

Main Subjects

Information Technology and Computer Science

No. of Pages

81

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Theoretical background and literature review.

Chapter Three : Methodology and proposed model.

Chapter Four : Implementation and experimental results.

Chapter Five : Conclusion and future work.

References.

American Psychological Association (APA)

Khalifah, Amir Hikmat. (2021). Innovative technique to encrypt data for data mining purposes in cloud computing. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-1403035

Modern Language Association (MLA)

Khalifah, Amir Hikmat. Innovative technique to encrypt data for data mining purposes in cloud computing. (Master's theses Theses and Dissertations Master). Middle East University. (2021).
https://search.emarefa.net/detail/BIM-1403035

American Medical Association (AMA)

Khalifah, Amir Hikmat. (2021). Innovative technique to encrypt data for data mining purposes in cloud computing. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-1403035

Language

English

Data Type

Arab Theses

Record ID

BIM-1403035