Cloud security using hybrid techniques / Rehab Emad Eldein Sayed Mohamed ; Supervised Salwa Elgamal , Basheer Abdelfattah Youssef
Material type: TextLanguage: English Publication details: Cairo : Rehab Emad Eldein Sayed Mohamed , 2017Description: 85 Leaves : charts ; 30cmOther title:- تأمين الحوسبة السحابية باستخدام تقنيات هجينة [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Thesis | قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.03.M.Sc.2017.Re.C (Browse shelf(Opens below)) | Not for loan | 01010110074410000 | |||
CD - Rom | مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.03.M.Sc.2017.Re.C (Browse shelf(Opens below)) | 74410.CD | Not for loan | 01020110074410000 |
Thesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Computer Science
The Cloud Computing paradigm is a new technology invented to help business companies and internet users to save their data in a huge space of unlimited storage, shared applications and services, instead of doing these tasks on local servers in their companies and on theirPC.Cloud users face many challenges when they use storage services in the cloud, some of these challenges are how can the user know the actual physical location for his data, since most cloud users don't know the cloud service provider (CSP) and this necessity arise from the fact that some malware or malicious activities can destroy users data or alter them in way without their permission.The Content Auditing, become an important issue which provides data integrity thatperiodically checks for data correction. This thesis proposed a content auditing model for checking the integrity of cloud users data by using Keyed hashing algorithms and provide trust in the cloud service provider (CSP), then how to recover these data if they have been corrupted or destroyed, user data can be programs, flat files, database files, webpages, etc. It is very important nowadays to check the integrity of user's data in the cloud since this era depends heavily on open computing and communications. Also, the thesis proposes a model for saving cloud users privacy and how this content auditing model provide dynamic data operations to provide such privacy feature, the data analysis resulted from our research showed that our model provides efficient and secure auditing techniques. The proposed auditing model providespowerful data integrity by using a secret key which is usually called message authentication code(MAC).The MAC Method depends on two communicating parties that have the same secret key to ensure valid data transmission between cloud user and cloud service provider
Issued also as CD
There are no comments on this title.