Search In this Thesis
   Search In this Thesis  
العنوان
Cryptography Scheme for Ensuring Data Confidentiality
in Cloud Environment /
المؤلف
El-Morshedy, Doaa Salah El-Dein El-Sayd Ali,
هيئة الاعداد
مناقش / Hatem Mohamed Said Ahmed
مناقش / Fatma Abd-El sattar Omara
مناقش / Wael Abd El-Kader Awad
مشرف / Noha Ezzat El-Attar
الموضوع
Cloud Environment
تاريخ النشر
2022.
عدد الصفحات
155 p. ;
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
Multidisciplinary
تاريخ الإجازة
25/5/2022
مكان الإجازة
جامعة بورسعيد - كلية العلوم ببورسعيد - Department of Mathematics and Computer Science
الفهرس
Only 14 pages are availabe for public view

from 155

from 155

Abstract

Cloud computing is a type of internet-based computing considered a new flavor of computing. Cloud computing provides several essential benefits to both individual users and businesses, beginning with allowing them to request self-service with instant flexibility, reserving and using a shared pool of resources such as storage, processing, and/or networking with pay-as-you-go manner in a cost-effective way.
One of the vital Cloud services is storing the users’ data in a remotely location on a Cloud’s storage resource. This storage has to be characterized by a high level of security and safety to ensure data integrity and preserve its confidentiality. Many organizations and users discreetly outsource their data on cloud remote servers, fearing data leakage, loss of control, and unauthorized access. Therefore, the storage and maintenance of user data at a remote location are considered serious issues to ensure data privacy and confidentiality.
The core of Cloud Computing is to deliver the desired service while relieving customers of infrastructure maintenance. This feature often separates users from their data because providers usually store users’ data on physical resources via remote access to accomplish availability. But, users must continually ensure the confidentiality and protection of their data and its availability. The use of the Cloud Third Party (CTP) makes deals with cloud data easy, straightforward, and flexible, even when data encryption is not offered. In general, the CTP in the Cloud environment performs several functions such as investigating data storage, verifying data accuracy, implementing and ensuring data integrity, and performing public auditing on stored data. Despite the evident important role of CTP, it may adversely affect the cloud environment’s security and become an untrustworthy insider employee (i.e., malicious insider). Thus, to save data confidentiality, the stored data should be protected before outsourcing it to the cloud environment by using strong cryptographic techniques.