000 03395cam a2200337 a 4500
003 EG-GiCUC
005 20250223031550.0
008 160925s2016 ua dh f m 000 0 eng d
040 _aEG-GiCUC
_beng
_cEG-GiCUC
041 0 _aeng
049 _aDeposite
097 _aM.Sc
099 _aCai01.20.01.M.Sc.2016.He.E
100 0 _aHeba Allah Sherif Mohamed Sobhy Abdelhay
245 1 0 _aEfficient securing of data in mobile cloud computing /
_cHeba Allah Sherif Mohamed Sobhy Abdelhay ; Supervised Hesham Nabih Elmahdy , Amira Mohamed Kotb
246 1 5 _aتأمين البيانات بشكل أكثر كفاءة في الحوسبة السحابية النقالة
260 _aCairo :
_bHeba Allah Sherif Mohamed Sobhy Abdelhay ,
_c2016
300 _a101 Leaves :
_bcharts , facsimiles ;
_c30cm
502 _aThesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information Technology
520 _aCloud computing is an important trend in IT and business. It changes the architecture of IT industry by providing computing resources to consumers as services. There are several issues in cloud computing that may act as obstacles to its wide spread. The most important issue of these obstacles is security. For the last few years, mobile usage has grown significantly especially smartphones. Most people decided dispensing the use of their personal computers (i.e. desktops or laptops) and use mobile device instead. Because of mobile limitations, such as limited battery life, limited size of memory, and limited processor{u2019}s power, the need for Mobile Cloud Computing (MCC) has been increased. MCC is the integration of both mobile device and cloud computing. The big challenge of using MCC is data privacy and security. Data is needed to be secure while transmission to/from the cloud, and while storage on the cloud. In this thesis, two models to secure mobile user{u2019}s data are proposed. These models provide confidentiality, authentication, and integrity for data stored on the mobile cloud. The first model 2ARDS3 uses Advanced Encryption Standard (AES), and RSA (Rivest-Shamir-Adleman) Digital Signature. It uses AES for confidentiality, and uses RSA Digital Signature for authentication and integrity. The second model 2AHMAC3 uses AES, and HMAC (Hash-based-Message-Authentication-Code). It uses AES for confidentiality, and uses HMAC for authentication and integrity. AHMAC model is considered as a contribution that leads to improvement in the performance of ARDS model. A simulation program was developed, using an Android development kit, a trusted third party simulated in JAVA, and Dropbox as the cloud used for storage. ARDS model, AHMAC model, and a model proposed before by Garg and Sharma were all simulated in the same environment. Firstly, the proposed ARDS model was evaluated in comparison to the model proposed by Garg and Sharma that uses RSA, Hashing, and DES algorithms. Then, the proposed AHMAC model was evaluated in comparison to the proposed ARDS model
530 _aIssued also as CD
653 4 _aData
653 4 _aEfficient securing
653 4 _aMobile cloud computing
700 0 _aAmira Mohamed Kotb ,
_eSupervisor
700 0 _aHesham Nabih Elmahdy ,
_eSupervisor
856 _uhttp://172.23.153.220/th.pdf
905 _aEnas
_eCataloger
905 _aNazla
_eRevisor
942 _2ddc
_cTH
999 _c57849
_d57849