Please use this identifier to cite or link to this item:
Title: Multilayered Data Centric Security on Distributed Clouds
Researcher: Radhamani.M
Guide(s): Sivaprakasam.P
Keywords: computer, data, centric, clouds
University: Mother Teresa Womens University
Completed Date: 25.03.2015
Abstract: Cloud Computing is emerged has a popular computing model and it is one of the fast growing areas of IT (Information Technology) industry. It includes several advantageous characteristics like on demand self service, broad network access, resource pooling, rapid elasticity and mesured service. This includes four deployment models namely Private Cloud, Public Cloud, Hybrid Cloud and Community Cloud. Cloud computing consists of three service models namely Platform as a service, Infrastructure as a service and Software as a service. Through these models, cloud computing provides various services to the business and IT world. All these services can be availed through Cloud Service Providers. Google, Amazon, and Microsoft etc are some of the cloud service providers. newlineCloud computing combines a number of computing concepts such as Service Oriented Architecture (SOA), Web 2.0, virtualization and other technologies. Cloud computing appears as a computing paradigm and it has distributed architecture. newlineCloud computing extends the IT s existing capabilities. Cloud computing allows end users and business clients to use applications without installation and access their personal files and corporate data at any computer, anywhere with internet access. Despite these valuable benefits, cloud lack security and privacy. This is because of its external data storage, dependency on public internet, lack of control and multitenency feature. When considering the security, it still needs some more security mesures. Several researches are going on in this area. To protect the published data, several methods are developed. All these have a common methodology of encryption. newlineThere are several methods and techniques used to maintain the security of data. This proposed work concentrates on data security at multiple levels. At each level it enhances its security. The proposed work is performed using CloudSim toolkit. newline
Pagination: xii, 222p.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.73 kBAdobe PDFView/Open
02_certificate.pdf288.34 kBAdobe PDFView/Open
03_abstract.pdf63.9 kBAdobe PDFView/Open
04_declaration.pdf251.15 kBAdobe PDFView/Open
05_acknowledgement.pdf86.23 kBAdobe PDFView/Open
06_contents.pdf77.98 kBAdobe PDFView/Open
07_list of tables.pdf80.38 kBAdobe PDFView/Open
08_list of figures.pdf73.43 kBAdobe PDFView/Open
09_abbreviations.pdf76.13 kBAdobe PDFView/Open
10_chapter 1.pdf2.24 MBAdobe PDFView/Open
11_chapter 2.pdf285.8 kBAdobe PDFView/Open
12_chapter 3.pdf5.63 MBAdobe PDFView/Open
13_chapter 4.pdf573.51 kBAdobe PDFView/Open
14_conclusion.pdf89.51 kBAdobe PDFView/Open
15_summary.pdf57.47 kBAdobe PDFView/Open
16_bibliography.pdf143.76 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.