Loading...

Providing Confidentiality of Outsourced Data through Fragmentation

Dodangeh, Peyman | 2012

306 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 43473 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Jalili, Rasool
  7. Abstract:
  8. Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced data, has been offered. One of these approaches is Data Fragmentation, which introduce noticeable ideas to overcome the security challenges in outsourced scenarios. On the other issues must be considered is the balance between confidentiality requirements and utility is a classical problem with an increasing impact on the design of modern information systems. Although it is crucial to ensure that sensitive information is properly protected; on the other side, the impact of protection on the workload in the time that we are using the outsourcing approach, must be limited as a query efficiency and system performance remain a primary requirement. According to both requirements, providing confidentiality and utiliy in outsourced scnarios, the main goal in writing of this thesis is to offer a comprehensive approach that, not only is based on Data Fragmentation, but also applies many optimizations to improve computational and storage overhead, which all the previous approaches suffers from, to enable the approach to be used in a real world.
  9. Keywords:
  10. Confidentiality ; Outsourcing ; Segmentation

 Digital Object List

 Bookmark

No TOC