Please use this identifier to cite or link to this item:
|Title||A Confidentiality Protection Approach Based on Three-Way Fragmentation for Cloud Out-Sourcing of Mobile Data|
|Title in Arabic||طريقة ثلاثية التجزئة لحماية سرية البيانات المتنقلة الخارجة إلى السحابة|
Despite the increasing dependency on smart phones and mobile data-sensitive applications, these devices have limited storage and processing capabilities. They operate in unreliable environments leading to possible loss of valuable data, if not properly managed. Mobile data outsourcing through the cloud allows users to send their potentially sensitive data to external servers that become responsible for their storage, management, and dissemination. However, such cloud outsourcing may lead to violation of privacy if the network/server cannot be fully trusted. While encrypting the data prior to sending appears to be a solution for this problem, this is computationally intensive and infeasible in the case of mobile devices. In this thesis, we develop a confidentiality protection approach for cloud out-sourcing of mobile data. It performs encryption for partial data that takes into account both the confidentiality constraints of the data being collected and the limitations of the mobile devices. Our approach employs hybrid fragmentation (vertical and horizontal fragmentation) to determine those parts that need to be encrypted and those that can be sent in clear, also those that should be stored at the owner's side. We provide an implementation of the confidentiality protection approach. The implantation is basically based on the architecture of the approach and realizes the confidentiality constraints specified as a basis for the data partitioning. We present an evaluation to the confidentiality approach to show its ability to satisfy the constraints imposed on the injury and martyr data and used to fragment these data as defined by the approach. We perform a number of tests to check if the data is fragmented and uploaded to the cloud as required and within the required time. Additionally we compare our approach to a similar approach to show that ours outperforms the other approach in satisfying the confidentiality constraints taking less space and time.
|Publisher||الجامعة الإسلامية - غزة|
|Files in this item|