Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/173820
Title: | On demand secure transfer of outsourced file with integrity verification in cloud environment |
Researcher: | Jospin Jeya J |
Guide(s): | Kannan E |
University: | Vel Tech Dr. R R and Dr. S R Technical University |
Completed Date: | 2017 |
Abstract: | Cloud computing facilitates extremely scalable services that can be consumed over the internet. An important aspect of the cloud services is that the user data are stored remotely in unknown machines in which users do not posses or manage. Data security and integrity is an important research area during the last few years. Cloud computing gives virtual environment that allows cloud users to access the resources of the cloud in a convenient and on-demand manner. Since the data are stored remotely, we have to keep in mind that sensitive cloud data have to be encrypted before they are outsourced to the commercial public cloud, which makes efficient data utilization service. newline The first part of the work presented in this thesis is top n file retrieval using cluster based ranking method. Searchable encryption file retrieval technique allows users to securely search over encrypted data through search word. Ranking the files based on relevance scores greatly enhances system usability by making it possible relevance ranking instead of sending unwanted results and further ensures the file retrieval accuracy. In this study, we are developing an automated system for both named and unnamed documents based on the clustering algorithms. We implement the ranking and searching algorithm to retrieve top n files. The resulting design is able to provide efficient ranking which will reduce the search time drastically and reduce the communication overhead. The mapping and encryption algorithms protect document against an outside attacker and prevent an untrusted cloud data provider from learning data. newline The second part of the work presented in this thesis is a secure key management for efficient data sharing in cloud computing. Security solution for cloud centric PC s was consistent in providing the on-demand services. Cloud infrastructure is flexible and scalable in all aspects; hence an enhanced level of security mechanism is desirable for secured file transfer. The common way to protect data before outsourcing the da |
URI: | http://hdl.handle.net/10603/173820 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
abstract.pdf | Attached File | 184.1 kB | Adobe PDF | View/Open |
chapter 1.pdf | 464.71 kB | Adobe PDF | View/Open | |
chapter_2.pdf | 114.09 kB | Adobe PDF | View/Open | |
chapter_3.pdf | 426.64 kB | Adobe PDF | View/Open | |
chapter_4.pdf | 353.59 kB | Adobe PDF | View/Open | |
chapter_5.pdf | 795.77 kB | Adobe PDF | View/Open | |
chapter_6.pdf | 55.99 kB | Adobe PDF | View/Open | |
curriculum_vitae.pdf | 45.86 kB | Adobe PDF | View/Open | |
first pages.pdf | 534.42 kB | Adobe PDF | View/Open | |
list_of_publications.pdf | 48.92 kB | Adobe PDF | View/Open | |
references.pdf | 77.76 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: