![](/images/graphics-bg.png)
A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data
Other Title(s)
طريقة ثلاثية التجزئة لحماية سرية البيانات المتنقلة الخارجة إلى السحابة
Dissertant
Thesis advisor
Comitee Members
Khattab, Sharif Isam al-Din
Barhum, Tawfiq Sulayman
University
Islamic University
Faculty
Faculty of Information Technology
University Country
Palestine (Gaza Strip)
Degree
Master
Degree Date
2015
English Abstract
Despite the increasing dependency on smart phones and mobile data-sensitive applications, these devices have limited storage and processing capabilities.
They operate in unreliable environments leading to possible loss of valuable data, if not properly managed.
Mobile data outsourcing through the cloud allows users to send their potentially sensitive data to external servers that become responsible for their storage, management, and dissemination.
However, such cloud outsourcing may lead to violation of privacy if the network/server cannot be fully trusted.
While encrypting the data prior to sending appears to be a solution for this problem, this is computationally intensive and infeasible in the case of mobile devices.
In this thesis, we develop a confidentiality protection approach for cloud out-sourcing of mobile data.
It performs encryption for partial data that takes into account both the confidentiality constraints of the data being collected and the limitations of the mobile devices.
Our approach employs hybrid fragmentation (vertical and horizontal fragmentation) to determine those parts that need to be encrypted and those that can be sent in clear, also those that should be stored at the owner's side.
We provide an implementation of the confidentiality protection approach.
The implantation is basically based on the architecture of the approach and realizes the confidentiality constraints specified as a basis for the data partitioning.
We present an evaluation to the confidentiality approach to show its ability to satisfy the constraints imposed on the injury and martyr data and used to fragment these data as defined by the approach.
We perform a number of tests to check if the data is fragmented and uploaded to the cloud as required and within the required time.
Additionally we compare our approach to a similar approach to show that ours outperforms the other approach in satisfying the confidentiality constraints taking less space and time.
Main Subjects
Information Technology and Computer Science
No. of Pages
76
Table of Contents
Table of contents.
Abstract.
Abstract in Arabic.
Chapter One : Introduction.
Chapter Two : Related works.
Chapter Three : Theoretical foundation.
Chapter Four : The proposed protection approach.
Chapter Five : Implementation of the confidentiality protection approach.
Chapter Six : Evaluation.
Chapter Seven : Conclusion and future work.
References.
American Psychological Association (APA)
al-Tala, Rana Husayn Mahmud. (2015). A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688772
Modern Language Association (MLA)
al-Tala, Rana Husayn Mahmud. A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University. (2015).
https://search.emarefa.net/detail/BIM-688772
American Medical Association (AMA)
al-Tala, Rana Husayn Mahmud. (2015). A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688772
Language
English
Data Type
Arab Theses
Record ID
BIM-688772