Show simple item record

dc.contributor.advisorWon, Chang-Hee, 1967-
dc.creatorWang, Zicong
dc.date.accessioned2020-11-05T16:10:00Z
dc.date.available2020-11-05T16:10:00Z
dc.date.issued2018
dc.identifier.urihttp://hdl.handle.net/20.500.12613/3790
dc.description.abstractThe Smartphone-based Compression-Induced System (SCIS) is developed to obtain the mechanical properties of a tumor. Using a SCIS smartphone app, we obtain tactile images, and we developed data security methodology in this thesis. The first version of the system (SCIS V1) is developed using the symmetric key encryption, which protects all medical data from hackers. AES (Advanced Encryption Standard) encryption method is used to protect the data during the transmission. Encrypted data by AES is securely stored in the cloud server and used for processing in the local server. This security system uses Xcode and Python to encrypt and decrypt data. Even if the encrypted data is hacked, contents will be unreadable. In order to increase some of the scrutiny features of SCIS, we developed a new version. The second version (SCIS V2) includes the AES data encryption, the user authentication control, security key exchange system, and communication security. User authentication control part is the first step in preventing the accidental data leakage. Combining symmetric key encryption and asymmetric security key exchange is very effective to prevent attacks because the data and keys are encrypted before transmission. The data transmission protocol used in this system is also a secure protocol, which includes Secure Sockets Layer/Transport Layer Security (SSL/TLS). This protocol is the asymmetric encryption transmission protocol, which is used to transport encrypted data and encrypted keys in SCIS V2 systems. The Compression-Induced System Data Security is fully implemented in SCIS V2.
dc.format.extent84 pages
dc.language.isoeng
dc.publisherTemple University. Libraries
dc.relation.ispartofTheses and Dissertations
dc.rightsIN COPYRIGHT- This Rights Statement can be used for an Item that is in copyright. Using this statement implies that the organization making this Item available has determined that the Item is in copyright and either is the rights-holder, has obtained permission from the rights-holder(s) to make their Work(s) available, or makes the Item available under an exception or limitation to copyright (including Fair Use) that entitles it to make the Item available.
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectEngineering
dc.titleSMARTPHONE-BASED COMPRESSION-INDUCED IMAGING SYSTEM DATA SECURITY
dc.typeText
dc.type.genreThesis/Dissertation
dc.contributor.committeememberWon, Chang-Hee, 1967-
dc.contributor.committeememberBai, Li
dc.contributor.committeememberKim, Albert
dc.description.departmentElectrical and Computer Engineering
dc.relation.doihttp://dx.doi.org/10.34944/dspace/3772
dc.ada.noteFor Americans with Disabilities Act (ADA) accommodation, including help with reading this content, please contact scholarshare@temple.edu
dc.description.degreeM.S.E.E.
refterms.dateFOA2020-11-05T16:10:00Z


Files in this item

Thumbnail
Name:
Wang_temple_0225M_13406.pdf
Size:
3.737Mb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record