Please use this identifier to cite or link to this item:
Researcher: Suthar K.C.
Guide(s): Patel J.M.
University: Rai University
Completed Date: 2017
Abstract: Cloud computing is now a day s becomes the most attracted phenomena to use for large newlinescale organization or for individual who need various network services with least cost. newlineNormally individual s information is stored on public Cloud which is available to newlineeveryone for access. This fundamental raises some issue opposite to flexible services newlineprovided by cloud providers, like Confidentiality, Integrity, Availability, Authorization newlineand many more. newlineRecently, Lots of options are available to protect the data and most preferable ways is to newlineuse encryption. Encryption only can t provide enough protection while considering lots newlineof users sensitive information. It also consumes more time to perform encryption and newlinedecryption process for every single query. Secondly it s not a good practice to think newlineonly about user centric because once user data is uploaded on Cloud premises, user newlinedoesn t have direct control over this data. Considering this fact, we must need to think newlineabout the security of user s valuable information on Cloud server. This becomes newlinepossible using the important techniques that s obfuscation. To remove burden of Cloud newlineserver as well to provide adequate security to user s information, we propose a newlinemethodology by combining both techniques wiz. Obfuscation and Encryption in this newlinethesis. newlineThe user data may be encrypted if it requires security for its files or document and the newlineDaaS service of Cloud is secured using obfuscation techniques. Using these two way newlineapproach, we can say that the proposed scheme offers enough security towards newlineanonymous access and preserve privacy even the information available on Cloud newlineservers. Our aim is also to provide proper integrity checking mechanism, better access newlinecontrol mechanism, Group sharing mechanism etc. which lessen the burden and newlineincrease trust level between Client and Service Providers. newline
Appears in Departments:Department of Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
01 title.pdfAttached File96.34 kBAdobe PDFView/Open
02 certificates.pdf53.32 kBAdobe PDFView/Open
03 acknowledgement.pdf8.8 kBAdobe PDFView/Open
04 abstract.pdf10.03 kBAdobe PDFView/Open
05 content.pdf10.11 kBAdobe PDFView/Open
06 lst of tables,figures, nomenclature & abrevations.pdf149.57 kBAdobe PDFView/Open
07 chapter 1.pdf202.94 kBAdobe PDFView/Open
08 chapter 2.pdf49.8 kBAdobe PDFView/Open
09 chapter 3.pdf21.86 kBAdobe PDFView/Open
10 chapter 4.pdf103.04 kBAdobe PDFView/Open
11 chapter 5.pdf484.33 kBAdobe PDFView/Open
12 chapter 8.pdf23.21 kBAdobe PDFView/Open
13 chapter 7.pdf4.1 MBAdobe PDFView/Open
14 bibliography.pdf32.83 kBAdobe PDFView/Open
15 appendix.pdf72.58 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.