• English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
  • Communities & Collections
  • Browse OpenUCT
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
  1. Home
  2. Browse by Subject

Browsing by Subject "Telecommunication"

Now showing 1 - 2 of 2
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Open Access
    Data storage security for cloud computing using elliptic curve cryptography
    (University of Cape Town, 2020) Buop, George Onyango; Murgu, Alexandru
    Institutions and enterprises are moving towards more service availability, managed risk and at the same time, aim at reducing cost. Cloud Computing is a growing technology, thriving in the fields of information communication and data storage. With the proliferation of online activity, more and more information is saved as data every day. This means that more data is being stored in the cloud than ever before. Data that is stored online often holds private information – such as addresses, payment details and medical documentation. These become the target of cyber criminals. There is therefore growing need to protect these data from threats and issues such as data breach and leakage, data loss, account takeover or hijackings, among others. Cryptography refers to securing the information and communication techniques based on mathematical concepts and algorithms which transform messages in ways that are hard to decipher. Cryptography is one of the techniques we could protect data stored in the cloud as it enables security properties of data confidentiality and integrity. This research investigates the security issues that affect storage of data in the cloud. This thesis also discusses the previous research work and the currently available technology and techniques that are used for securing data in the cloud. This thesis then presents a novel scheme for security of data stored in Cloud Computing by using Elliptic Curve Integrated Encryption Scheme (ECIES) that provides for confidentiality and integrity. This scheme also uses Identity Based Cryptography (IBC) for more efficient key management. The proposed scheme combines the security of Identity- Based Cryptography (IBC), Trusted cloud (TC), and Elliptic Curve Cryptography (ECC) to reduce system complexity and provide more security for cloud computing applications. The research shows that it is possible to securely store confidential user data on a Public Cloud such as Amazon S3 or Windows Azure Storage without the need to trust the Cloud Provider and with minimal overhead in processing time. The results of implementing the proposed scheme shows faster and more efficient communication operation when it comes to key generation as well as encryption and decryption. The difference in the time taken for these operations is as a result of the use of ECC algorithm which has a small key size and hence highly efficient compared with other types of asymmetric cryptography. The results obtained show the scheme is more efficient, when compared with other classification techniques in the literature.
  • Loading...
    Thumbnail Image
    Item
    Open Access
    Telecommunications law and regulation in Lesotho - A critical analysis
    (2014-07-30) Lebone, Likonelo
    In 2000, the Lesotho telecommunications sector underwent a fundamental change in structure, from that of monopoly to one of competition. A new regulatory regime was introduced and a regulatory agency, the Lesotho Telecommunications Authority was established to promote telecommunications development and to safeguard competition. The 2000 legal framework supports competition but fails to adequately minimise the regulatory risk. The new regime also failed to facilitate improved or satisfactory sector performance. The Lesotho regulatory framework addresses most internationally recognised telecommunications regulatory issues, but most areas needs improvement if sector performance and investor perception is to be enhanced. Firstly, the Government must give the regulatory Authority functional independence. Secondly, the Authority must revisit various policy areas. For instance universal access policy and programmes that bring affordable services to the rural and urban populations alike must be developed and implemented; complimentary policies that encourage the use of the services and investment in the sector, like investment, consumer protection and competition policies must be adopted; alternative dispute resolution mechanisms, especially for disputes between the regulator and service providers must be introduced and preferred in the sector. The challenge is to bring telecommunication services to all communities including low-income families and communities in rural and mountainous areas. Thus whatever policies are adopted, universal access and improved sector performance should be a guiding goal which must be pursued rigorously.
UCT Libraries logo

Contact us

Jill Claassen

Manager: Scholarly Communication & Publishing

Email: openuct@uct.ac.za

+27 (0)21 650 1263

  • Open Access @ UCT

    • OpenUCT LibGuide
    • Open Access Policy
    • Open Scholarship at UCT
    • OpenUCT FAQs
  • UCT Publishing Platforms

    • UCT Open Access Journals
    • UCT Open Access Monographs
    • UCT Press Open Access Books
    • Zivahub - Open Data UCT
  • Site Usage

    • Cookie settings
    • Privacy policy
    • End User Agreement
    • Send Feedback

DSpace software copyright © 2002-2025 LYRASIS