Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/23393
Title: Confidentiality of Data in Public Cloud Storage Using Hybrid Encryption Algorithms
Other Titles: سرية البيانات في المخزن السحابي العام بإستخدام خوارزميات التشفير الهجين
Authors: Mohammed, Khabab Mustafa Al-Khalifa
Supervisor, - Faisal Mohammed
Keywords: Confidentiality of Data
Cloud Storage
Hybrid Encryption Algorithms
Issue Date: 1-Jan-2019
Publisher: Sudan University of Science & Technology
Citation: Mohammed, Khabab Mustafa Al-Khalifa.Confidentiality of Data in Public Cloud Storage Using Hybrid Encryption Algorithms\Khabab Mustafa Al-Khalifa Mohammed;Faisal Mohammed.-Khartoum:Sudan University of Science & Technology,College of Computer Science and Information Technology,2019.-52p.:ill.;28cm.-M.Sc.
Abstract: Cloud computing is a recent technology that uses the Internet, central servers to organize the data and applications, which the user can access, cloud computing enables individuals and organizations to gain access to huge computing resources without capital investment. one of the main drawbacks of cloud computing is data security. when data migrate to the cloud, is fully controlled by cloud service provider not by the data owner. As a result, user data is not secure at the server side. Security goals of data cover three points namely: Availability, Confidentiality, and Integrity [1]. This thesis handled Confidentiality of file using hybrid of symmetric encryption algorithms (AES with key (128), AES with key (256) and Blowfish),the proposed technique based on providing data confidentiality by the software, each user wants to upload to, or download a file from the cloud storage which must be passed to the software. Where the software performs encoding process by splitting it into three blocks with different sizes and selecting algorithms randomly to encrypt blocks of file before uploading and saving the information's of encoding process in local database, also the software performs the decoding process by retrieving the information's of encoding process to decrypt the file after downloading it from the cloud storage.the thesis was checked the randomness of sequence binary bits of file, and evaluate the time of the encoding and decoding processes of this proposed method and compared it with time of encryption algorithms: AES-128, AES-256, Blowfish.
Description: Thesis
URI: http://repository.sustech.edu/handle/123456789/23393
Appears in Collections:Masters Dissertations : Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
Confidentiality of Data......pdfResearch845.52 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.