Please use this identifier to cite or link to this item:
https://repository.sustech.edu/handle/123456789/23393
Title: | Confidentiality of Data in Public Cloud Storage Using Hybrid Encryption Algorithms |
Other Titles: | سرية البيانات في المخزن السحابي العام بإستخدام خوارزميات التشفير الهجين |
Authors: | Mohammed, Khabab Mustafa Al-Khalifa Supervisor, - Faisal Mohammed |
Keywords: | Confidentiality of Data Cloud Storage Hybrid Encryption Algorithms |
Issue Date: | 1-Jan-2019 |
Publisher: | Sudan University of Science & Technology |
Citation: | Mohammed, Khabab Mustafa Al-Khalifa.Confidentiality of Data in Public Cloud Storage Using Hybrid Encryption Algorithms\Khabab Mustafa Al-Khalifa Mohammed;Faisal Mohammed.-Khartoum:Sudan University of Science & Technology,College of Computer Science and Information Technology,2019.-52p.:ill.;28cm.-M.Sc. |
Abstract: | Cloud computing is a recent technology that uses the Internet, central servers to organize the data and applications, which the user can access, cloud computing enables individuals and organizations to gain access to huge computing resources without capital investment. one of the main drawbacks of cloud computing is data security. when data migrate to the cloud, is fully controlled by cloud service provider not by the data owner. As a result, user data is not secure at the server side. Security goals of data cover three points namely: Availability, Confidentiality, and Integrity [1]. This thesis handled Confidentiality of file using hybrid of symmetric encryption algorithms (AES with key (128), AES with key (256) and Blowfish),the proposed technique based on providing data confidentiality by the software, each user wants to upload to, or download a file from the cloud storage which must be passed to the software. Where the software performs encoding process by splitting it into three blocks with different sizes and selecting algorithms randomly to encrypt blocks of file before uploading and saving the information's of encoding process in local database, also the software performs the decoding process by retrieving the information's of encoding process to decrypt the file after downloading it from the cloud storage.the thesis was checked the randomness of sequence binary bits of file, and evaluate the time of the encoding and decoding processes of this proposed method and compared it with time of encryption algorithms: AES-128, AES-256, Blowfish. |
Description: | Thesis |
URI: | http://repository.sustech.edu/handle/123456789/23393 |
Appears in Collections: | Masters Dissertations : Computer Science and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Confidentiality of Data......pdf | Research | 845.52 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.