Search In this Thesis
   Search In this Thesis  
العنوان
Cloud security using hybrid techniques /
الناشر
Rehab Emad Eldein Sayed Mohamed ,
المؤلف
Rehab Emad Eldein Sayed Mohamed
هيئة الاعداد
باحث / Rehab Emad Eldein Sayed Mohamed
مشرف / Salwa Elgamal
مشرف / Basheer Abdelfattah Youssef
مشرف / Salwa Elgamal
تاريخ النشر
2017
عدد الصفحات
85 Leaves :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science Applications
تاريخ الإجازة
25/2/2018
مكان الإجازة
جامعة القاهرة - كلية الحاسبات و المعلومات - Computer Science
الفهرس
Only 14 pages are availabe for public view

from 96

from 96

Abstract

The Cloud Computing paradigm is a new technology invented to help business companies and internet users to save their data in a huge space of unlimited storage, shared applications and services, instead of doing these tasks on local servers in their companies and on theirPC.Cloud users face many challenges when they use storage services in the cloud, some of these challenges are how can the user know the actual physical location for his data, since most cloud users don’t know the cloud service provider (CSP) and this necessity arise from the fact that some malware or malicious activities can destroy users data or alter them in way without their permission.The Content Auditing, become an important issue which provides data integrity thatperiodically checks for data correction. This thesis proposed a content auditing model for checking the integrity of cloud users data by using Keyed hashing algorithms and provide trust in the cloud service provider (CSP), then how to recover these data if they have been corrupted or destroyed, user data can be programs, flat files, database files, webpages, etc. It is very important nowadays to check the integrity of user’s data in the cloud since this era depends heavily on open computing and communications. Also, the thesis proposes a model for saving cloud users privacy and how this content auditing model provide dynamic data operations to provide such privacy feature, the data analysis resulted from our research showed that our model provides efficient and secure auditing techniques. The proposed auditing model providespowerful data integrity by using a secret key which is usually called message authentication code(MAC).The MAC Method depends on two communicating parties that have the same secret key to ensure valid data transmission between cloud user and cloud service provider