A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data

Other Title(s)

طريقة ثلاثية التجزئة لحماية سرية البيانات المتنقلة الخارجة إلى السحابة

Dissertant

al-Tala, Rana Husayn Mahmud

Thesis advisor

Barakah, Ribhi Sulayman

Comitee Members

Khattab, Sharif Isam al-Din
Barhum, Tawfiq Sulayman

University

Islamic University

Faculty

Faculty of Information Technology

University Country

Palestine (Gaza Strip)

Degree

Master

Degree Date

2015

English Abstract

Despite the increasing dependency on smart phones and mobile data-sensitive applications, these devices have limited storage and processing capabilities.

They operate in unreliable environments leading to possible loss of valuable data, if not properly managed.

Mobile data outsourcing through the cloud allows users to send their potentially sensitive data to external servers that become responsible for their storage, management, and dissemination.

However, such cloud outsourcing may lead to violation of privacy if the network/server cannot be fully trusted.

While encrypting the data prior to sending appears to be a solution for this problem, this is computationally intensive and infeasible in the case of mobile devices.

In this thesis, we develop a confidentiality protection approach for cloud out-sourcing of mobile data.

It performs encryption for partial data that takes into account both the confidentiality constraints of the data being collected and the limitations of the mobile devices.

Our approach employs hybrid fragmentation (vertical and horizontal fragmentation) to determine those parts that need to be encrypted and those that can be sent in clear, also those that should be stored at the owner's side.

We provide an implementation of the confidentiality protection approach.

The implantation is basically based on the architecture of the approach and realizes the confidentiality constraints specified as a basis for the data partitioning.

We present an evaluation to the confidentiality approach to show its ability to satisfy the constraints imposed on the injury and martyr data and used to fragment these data as defined by the approach.

We perform a number of tests to check if the data is fragmented and uploaded to the cloud as required and within the required time.

Additionally we compare our approach to a similar approach to show that ours outperforms the other approach in satisfying the confidentiality constraints taking less space and time.

Main Subjects

Information Technology and Computer Science

No. of Pages

76

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Related works.

Chapter Three : Theoretical foundation.

Chapter Four : The proposed protection approach.

Chapter Five : Implementation of the confidentiality protection approach.

Chapter Six : Evaluation.

Chapter Seven : Conclusion and future work.

References.

American Psychological Association (APA)

al-Tala, Rana Husayn Mahmud. (2015). A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688772

Modern Language Association (MLA)

al-Tala, Rana Husayn Mahmud. A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University. (2015).
https://search.emarefa.net/detail/BIM-688772

American Medical Association (AMA)

al-Tala, Rana Husayn Mahmud. (2015). A confidentiality protection approach based on three-way fragmentation for cloud out-sourcing of mobile data. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688772

Language

English

Data Type

Arab Theses

Record ID

BIM-688772