Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/161114
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2017-07-24T09:42:45Z-
dc.date.available2017-07-24T09:42:45Z-
dc.identifier.urihttp://hdl.handle.net/10603/161114-
dc.description.abstractCloud data outsourcing services can potentially help reduce the IT budget of organizations.However, they pose significant risks to the security and privacy of the data as the data is outsourced to untrusted third-party servers. In this thesis, newlinewe propose security mechanisms for cloud data access control using symmetric key primitives. The contributions of this thesis are summarized below. We critically analyze the two types of key management hierarchy used for access control in outsourced data: user-based and resource-based. We show that both types of hierarchy have comparable public storage requirements. This result disproves a common belief that resource-based hierarchies require significantly more storage than user-based hierarchies. We also show that resource-based hierarchies are more efficient in terms of computation newlineand communication cost as compared to user-based hierarchies with respect to dynamic operations. The performance evaluation of dynamic operations is shown experimentally.We design a subscription-based hierarchical key assignment scheme with single key storage per user. Our construction is based on indirect key derivation with dependent keys. It reduces the public storage requirement of existing schemes, while also reducing the secret storage cost at the central authority. The scheme is formally analyzed using the provable security notion of key non-recovery. To our knowledge, this would be the first hierarchical key assignment scheme using dependent keys with a rigorous security proof.A weakness of existing write access control schemes is that a write authorized user can modify the files written by him even after the write privilege is revoked. We propose audit-based protocols so that if any unauthorized writes are performed they can be detected by the data owner. The protocols are implemented on Microsoft Azure platform and it is shown that the suggested mechanisms are viable in practice. newline
dc.format.extentxii, 150 p.
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleEfficient Revocable and Auditable Access over Encrypted Cloud Data
dc.title.alternative
dc.creator.researcherKumar, naveen
dc.subject.keywordData Privacy
dc.subject.keywordCloud based e-health
dc.subject.keywordAlgorithm
dc.subject.keywordKey Management
dc.subject.keywordMicrosoft Azure
dc.description.note
dc.contributor.guideMathuria, Anish
dc.publisher.placeGandhinagar
dc.publisher.universityDhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)
dc.publisher.institutionDepartment of Information and Communication Technology
dc.date.registered2010
dc.date.completed2017
dc.date.awarded
dc.format.dimensions30 cm.
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Information and Communication Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File82.36 kBAdobe PDFView/Open
02_declaration and certificate.pdf80.15 kBAdobe PDFView/Open
03_acknowledgements.pdf58.26 kBAdobe PDFView/Open
04_contents.pdf118.71 kBAdobe PDFView/Open
05_abstract.pdf72.95 kBAdobe PDFView/Open
06_list of tables.pdf128.16 kBAdobe PDFView/Open
07_chapter 1.pdf283.56 kBAdobe PDFView/Open
08_chapter 2.pdf728.06 kBAdobe PDFView/Open
09_chapter3.pdf488.65 kBAdobe PDFView/Open
10_chapter 4.pdf274.42 kBAdobe PDFView/Open
11_chapter 5.pdf329.78 kBAdobe PDFView/Open
12_chapter 6.pdf85.3 kBAdobe PDFView/Open
13_reference.pdf101.98 kBAdobe PDFView/Open
14_chapter a.pdf121.07 kBAdobe PDFView/Open
15_chapter b.pdf203.31 kBAdobe PDFView/Open
16_chapter c.pdf120.14 kBAdobe PDFView/Open
17_list of publication.pdf71.13 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).

Altmetric Badge: