• Login
    • Login
    Advanced Search
    View Item 
    •   UoN Digital Repository Home
    • Theses and Dissertations
    • Faculty of Science & Technology (FST)
    • View Item
    •   UoN Digital Repository Home
    • Theses and Dissertations
    • Faculty of Science & Technology (FST)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Implementing data integrity and confidentiality in mobile phone based cyber foraging system

    Thumbnail
    View/Open
    Fulltext (3.383Mb)
    Date
    2014
    Author
    Adede, Alfayo Oyugi
    Type
    Thesis; en_US
    Language
    en
    Metadata
    Show full item record

    Abstract
    Following the emergence of cyber foraging systems small resource constrained mobile phone devices are able to offload some of their resource intensive work to computationally powerful surrogate computers accessible on LAN. However, mobile phone based cyber foraging system also threatens control over data ownership, distribution and management. Users cannot be guaranteed that surrogate computers do not share data with unauthorized entities. Likewise, storing data on a mobile device causes user to lose control over that data when the device is stolen or lost; hence cannot prevent data from being compromised. This project examines the challenge of data integrity and confidentiality arising from using mobile phone based cyber foraging systems. We implemented and integrated data integrity and confidentiality enforcing mechanism based on Remote Access Control and Auditing (RACA) framework into an open source mobile phone based cyber foraging system prototype using use case approach. Experimental approach method is applied to measure and evaluate execution time overhead cost attributed to RACA integration. Result obtained indicated that RACA not only enhances data integrity and confidentiality but also imposes an insignificantly compromise on task offloading execution time. However, for enhanced confidentiality and availability we recommend the use of SSL protocol for data transmission and deployment of surrogate computers through defensive responses to Denial of Service (DoS) attacks respectively
    URI
    http://hdl.handle.net/11295/74990
    Citation
    Masters of Science in Computer Science.
    Publisher
    University of Nairobi
    Subject
    Cyber foraging systems
    Data integrity
    Data confidentiality
    Collections
    • Faculty of Science & Technology (FST) [4206]

    Copyright © 2022 
    University of Nairobi Library
    Contact Us | Send Feedback

     

     

    Useful Links
    UON HomeLibrary HomeKLISC

    Browse

    All of UoN Digital RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright © 2022 
    University of Nairobi Library
    Contact Us | Send Feedback