Search In this Thesis
   Search In this Thesis  
العنوان
Efficient Securing of Data in Mobile Cloud Computing/
المؤلف
Abdelhay, Heba Allah Sherif Mohamed Sobhy.
هيئة الاعداد
باحث / هبة االله شريف محمد صبحي عبدالحي
مشرف / هشام نبيه المهدي
مشرف / أميرة محمد قطب
مناقش / فتحي السيد عامر
الموضوع
Cloud computing. Mobile App.
تاريخ النشر
2015.
عدد الصفحات
125 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science (miscellaneous)
الناشر
تاريخ الإجازة
11/2/2016
مكان الإجازة
جامعة القاهرة - كلية الحاسبات و المعلومات - Information Technology
الفهرس
Only 14 pages are availabe for public view

from 16

from 16

Abstract

Cloud computing is an important trend in IT and business. It changes the architecture of IT industry by providingcomputing resources to consumers as services. There are several issues in cloud computing that may act as obstacles to its wide spread. The most important issue of these obstacles is security.
For the last few years, mobile usage has grown significantly especially smartphones. Most people decided dispensing the use of their personal computers (i.e. desktops or laptops) and use mobile device instead. Because of mobile limitations, such as limited battery life, limited size of memory, and limited processor’s power, the need for Mobile Cloud Computing (MCC) has been increased. MCC is the integration of both mobile device and cloud computing.The big challenge of using MCC is data privacy and security. Data is needed to be secure while transmission to/from the cloud, and while storage on the cloud.
In this thesis, two models to secure mobile user’s data are proposed. These models provide confidentiality, authentication, and integrity for data stored on the mobile cloud.The first model “ARDS” uses Advanced Encryption Standard (AES), and RSA (Rivest-Shamir-Adleman) Digital Signature. It uses AES for confidentiality, and uses RSA Digital Signature for authentication and integrity. The second model “AHMAC” uses AES, and HMAC (Hash-based-Message-Authentication-Code). It uses AES for confidentiality, and uses HMAC for authentication and integrity. AHMAC model is considered as a contribution that leads to improvement in the performance of ARDS model.
A simulation program was developed, using an Android development kit, a trusted third party simulated in JAVA, and Dropbox as the cloud used for storage. ARDS model, AHMAC model, and a model proposed before by Garg and Sharma were all simulated in the same environment. Firstly, the proposed ARDS model was evaluated in comparison to the model proposed by Garg and Sharma that uses RSA, Hashing, and DES algorithms. Then, the proposed AHMAC model was evaluated in comparison to the proposed ARDS model.