header

Efficient securing of data in mobile cloud computing / (Record no. 57849)

MARC details
000 -LEADER
fixed length control field 03395cam a2200337 a 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-GiCUC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250223031550.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160925s2016 ua dh f m 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-GiCUC
Language of cataloging eng
Transcribing agency EG-GiCUC
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Deposite
097 ## - Thesis Degree
Thesis Level M.Sc
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC)
Classification number Cai01.20.01.M.Sc.2016.He.E
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Heba Allah Sherif Mohamed Sobhy Abdelhay
245 10 - TITLE STATEMENT
Title Efficient securing of data in mobile cloud computing /
Statement of responsibility, etc. Heba Allah Sherif Mohamed Sobhy Abdelhay ; Supervised Hesham Nabih Elmahdy , Amira Mohamed Kotb
246 15 - VARYING FORM OF TITLE
Title proper/short title تأمين البيانات بشكل أكثر كفاءة في الحوسبة السحابية النقالة
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cairo :
Name of publisher, distributor, etc. Heba Allah Sherif Mohamed Sobhy Abdelhay ,
Date of publication, distribution, etc. 2016
300 ## - PHYSICAL DESCRIPTION
Extent 101 Leaves :
Other physical details charts , facsimiles ;
Dimensions 30cm
502 ## - DISSERTATION NOTE
Dissertation note Thesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information Technology
520 ## - SUMMARY, ETC.
Summary, etc. Cloud computing is an important trend in IT and business. It changes the architecture of IT industry by providing computing resources to consumers as services. There are several issues in cloud computing that may act as obstacles to its wide spread. The most important issue of these obstacles is security. For the last few years, mobile usage has grown significantly especially smartphones. Most people decided dispensing the use of their personal computers (i.e. desktops or laptops) and use mobile device instead. Because of mobile limitations, such as limited battery life, limited size of memory, and limited processor{u2019}s power, the need for Mobile Cloud Computing (MCC) has been increased. MCC is the integration of both mobile device and cloud computing. The big challenge of using MCC is data privacy and security. Data is needed to be secure while transmission to/from the cloud, and while storage on the cloud. In this thesis, two models to secure mobile user{u2019}s data are proposed. These models provide confidentiality, authentication, and integrity for data stored on the mobile cloud. The first model 2ARDS3 uses Advanced Encryption Standard (AES), and RSA (Rivest-Shamir-Adleman) Digital Signature. It uses AES for confidentiality, and uses RSA Digital Signature for authentication and integrity. The second model 2AHMAC3 uses AES, and HMAC (Hash-based-Message-Authentication-Code). It uses AES for confidentiality, and uses HMAC for authentication and integrity. AHMAC model is considered as a contribution that leads to improvement in the performance of ARDS model. A simulation program was developed, using an Android development kit, a trusted third party simulated in JAVA, and Dropbox as the cloud used for storage. ARDS model, AHMAC model, and a model proposed before by Garg and Sharma were all simulated in the same environment. Firstly, the proposed ARDS model was evaluated in comparison to the model proposed by Garg and Sharma that uses RSA, Hashing, and DES algorithms. Then, the proposed AHMAC model was evaluated in comparison to the proposed ARDS model
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Issued also as CD
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Data
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Efficient securing
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Mobile cloud computing
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Amira Mohamed Kotb ,
Relator term
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Hesham Nabih Elmahdy ,
Relator term
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://172.23.153.220/th.pdf">http://172.23.153.220/th.pdf</a>
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Enas
Reviser Cataloger
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Nazla
Reviser Revisor
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
Holdings
Source of classification or shelving scheme Not for loan Home library Current library Date acquired Full call number Barcode Date last seen Koha item type Copy number
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة قاعة الرسائل الجامعية - الدور الاول 11.02.2024 Cai01.20.01.M.Sc.2016.He.E 01010110069573000 22.09.2023 Thesis  
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة مخـــزن الرســائل الجـــامعية - البدروم 11.02.2024 Cai01.20.01.M.Sc.2016.He.E 01020110069573000 22.09.2023 CD - Rom 69573.CD