Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialComputer Science
dc.description.abstractNowadays, smart phones have become an integral part of daily life. These have proven to be a scientific invention that fills personal and business needs in a very efficient manner. In this era, the availability of smart phones has significantly increased because of the rich variety of smart phones and essential applications provided by the manufacturers. There are 6.9 billion mobile users around the world, which is equivalent to 95.5% of the world s population, as estimated by the International Telecommunication Union till May 2014. newlineA smartphone is a mobile device that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Based on this feature, smartphone user can develop any programs which are customized in specific needs. Furthermore, smartphone user can trade their assets like stocks or use banking service with wireless network. However, to provide these services, smartphone needs more private information than feature phone, thus, it is very important to keep smartphone secure. At the same time, numerous mobile device security issues and data privacy threats are challenging both manufacturers and users. Therefore, mobile devices are an ideal target for various security issues and data privacy threats. newlineIn present, there are many researches on smartphone security, but there is lack of effort to analyze all security threats of smartphone. This work is needed for design of security solution, to prevent against environment, vulnerabilities and resource constrained issues of smartphone. This extreme level of comfort has brought with it an extreme number of security risks. Some of the major challenges are due to Authentication, Malicious Applications, Data Storage and Data Retrieval. To overcome these mobile security issues and data privacy over threats, vulnerabilities and attacks, an effective defensive mechanism is essential. newlineFor authentication, biometric approaches (authentication/ verifications) in mobile device is explored, which reduces the security issues and data pr
dc.format.extent146 p.
dc.titleA Comprehensive Approach to Mobile Device and Data Security using Iris Authentication Malware Detection Secured Cloud Storage and Retrieval
dc.creator.researcherSujithra M
dc.subject.keywordEngineering and Technology
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Cybernetics
dc.contributor.guidePadmavathi G
dc.publisher.universityAvinashilingam Deemed University For Women
dc.publisher.institutionDepartment of Computer Science
dc.format.dimensions210 mm x 290 mm
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File7.65 kBAdobe PDFView/Open
02_certificate.pdf18.23 kBAdobe PDFView/Open
03_abstract.pdf29.47 kBAdobe PDFView/Open
04_contents.pdf47.69 kBAdobe PDFView/Open
05_list of tables and figures.pdf43.46 kBAdobe PDFView/Open
06_chapter-1.pdf219.28 kBAdobe PDFView/Open
07_chapter-2.pdf228.97 kBAdobe PDFView/Open
08_chapter-3.pdf725.66 kBAdobe PDFView/Open
09_chapter-4.pdf629.8 kBAdobe PDFView/Open
10_chapter-5.pdf632.7 kBAdobe PDFView/Open
11_chapter-6.pdf952.67 kBAdobe PDFView/Open
12_chapter-7.pdf457.19 kBAdobe PDFView/Open
13_chapter-8.pdf27.62 kBAdobe PDFView/Open
14_chapter-9.pdf16.66 kBAdobe PDFView/Open
15_references.pdf171.18 kBAdobe PDFView/Open
16_annexures.pdf360.06 kBAdobe PDFView/Open
80_recommendation.pdf16.66 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: