Bu kaydın yasal hükümlere uygun olmadığını düşünüyorsanız lütfen sayfa sonundaki Hata Bildir bağlantısını takip ederek bildirimde bulununuz. Kayıtlar ilgili üniversite yöneticileri tarafından eklenmektedir. Nadiren de olsa kayıtlarla ilgili hatalar oluşabilmektedir. MİTOS internet üzerindeki herhangi bir ödev sitesi değildir!

Auditor Technology and Privacy Control to Secure E-Learning İnformation on Cloud Storage

BROWSE_DETAIL_CREATION_DATE: 10-02-2017

BROWSE_DETAIL_IDENTIFIER_SECTION

BROWSE_DETAIL_TYPE: Thesis

BROWSE_DETAIL_SUB_TYPE: Masters

BROWSE_DETAIL_PUBLISH_STATE: Unpublished

BROWSE_DETAIL_FORMAT: PDF Document

BROWSE_DETAIL_LANG: English

BROWSE_DETAIL_SUBJECTS: TECHNOLOGY,

BROWSE_DETAIL_CREATORS: Al-Khafaji, Khalid Muhammad Kareem (Author),

BROWSE_DETAIL_CONTRIBUTERS: ERYILMAZ, Meltem (Advisor),

BROWSE_DETAIL_TAB_KEYWORDS

E-learning; Cloud; Auditor; Privacy; Shared Information; Protect.


BROWSE_DETAIL_TAB_ABSTRACT

The aim of this study, proposal to establish and applying a safe mechanism is: Technique Relationship Protected (TRP), that use a privacy control with the Auditor on the information shared between two of the most important services offered by modern technology, namely the E-learning platforms and service of cloud storage, as a matter of fact these technologies required relevant features in the databases made up of information that need safety. This study aims to shed light on the concept of ensuring privacy to protect information shared between the E-learning system and Cloud platform by proposing a mechanism to preserve the privacy of quite distinctive that supports public scrutiny on the information shared between these important technologies. It is worth mentioning that the study has a tendency to need to pick advantage of looping the signatures to verify the authenticity of the information required to review the validity the information shared encrypted. With our mechanism, entity location on each block in the joint information is unbroken figure of the year investigators, administrative body is able to check the efficiency of the safety of the common information, without retrieving the entire file.viThe proposed system keep a privacy of auditing mechanism for shared information with cloud keeping-safe.With use AES (Advanced Encryption Standard) for protecting the shared information by applying an encryption mechanism on the information that is being uploaded from its owners. They have been certified by the E-learning system administrators, and the application of a decrypt the encrypted information after user's requested, they trusted users has E-learning system after sponsorship by the owners of the information they need. We have to take advantage of ring autographs to build homomorphism authenticators so that a general verifier has the capacity to audit shared information integrity without retrieving the complete data or access to content. Addition to it cannot recognize who's the signer on file, this means that the power to administrator to reveal the identity of the signer. As well as the presence of additional functions in the work of the Auditor that contribute to the consolidation of this technique relationship protected.This is for the protect and the success of that relationship between the technical services which has become an urgent necessity in the modern technical world that contains a very massive amount of data and information those shared and transmitted daily between branches of our technological world.


BROWSE_DETAIL_TAB_TOC



BROWSE_DETAIL_TAB_DESCRIPTION



BROWSE_DETAIL_TAB_RIGHTS



BROWSE_DETAIL_TAB_NOTES



BROWSE_DETAIL_TAB_REFERENCES


BROWSE_DETAIL_TAB_REFERENCED_BYS

BROWSE_DETAIL_GOTO_LIST

 

TEXT_STATS

  • TEXT_RECORD_STATS
    • TEXT_STATS_THIS_MONTH: 3
    • TEXT_STATS_TOTAL: 2417
  • TEXT_ONLINE_STATS
    • TEXT_ONLINE_STATS_TOTALONLINEVISITOR: 14
    • TEXT_ONLINE_STATS_TOTALONLINEUSER: 0
    • TEXT_STATS_TOTAL: 14

LINK_STATS