Enhancing security of cloud computing based on cryptography / Rasha Abdelkader Refaie ; Supervised Hesham A. Hefny , Abdelaziz A. Abdelaziz
Material type: TextLanguage: English Publication details: Cairo : Rasha Abdelkader Refaie , 2017Description: 89 Leaves : charts , facsimiles ; 30cmOther title:- تحسين أمن الحوسبة السحابية اعتماداً على التشفير [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Thesis | قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.07.M.Sc.2017.Ra.E (Browse shelf(Opens below)) | Not for loan | 01010110074903000 | |||
CD - Rom | مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.07.M.Sc.2017.Ra.E (Browse shelf(Opens below)) | 74903.CD | Not for loan | 01020110074903000 |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Information Systems and Technology
Cloud computing means storing and accessing data and programs over the internet instead of your computer{u2019}s hard drive. The cloud computing offers service over internet with dynamically scalable resources. Computing services provide benefits to the users in terms of ease of use and pay as you go and only for what you use. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. Cloud computing allow companies to out source data and computations on demand. When data out source sensitive information become vulnerable to theft. Various techniques have been proposed to preserve a certain degree of privacy on database and allowing to execute queries efficiently on cloud computing. These techniques cannot support all queries over encrypted data. In this thesis, two secure techniques are proposed for executing queries over encrypted data.The proposed techniques build on CryptDB{u2019}s design. These techniques eliminate the limitation of cryptDB to perform server-side computations on values encrypted for different principals. The first technique tries to overcome this limitation by suggesting two tables for a single main table. The first table contains the encrypted data and the second one containing columns which has values encrypted by different keys and ID column in plain form. Whenever a search condition is on a column containing data encrypted with different keys, hence, the search will be performed on the Search_Table. In this technique the proxy does not need to decrypt all the values of the entire encrypted column; rather it decrypts only those values which satisfy the user query. The second proposed technique tries to overcome this limitation by encrypted the query with different keys and run every query on the corresponding data which encrypted by the same key. These queries will return these records which exactly the user wants from Encrypted_Table. The proxy decrypts only those values which satisfy the user query
Issued also as CD
There are no comments on this title.