Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/173820
Title: On demand secure transfer of outsourced file with integrity verification in cloud environment
Researcher: Jospin Jeya J
Guide(s): Kannan E
University: Vel Tech Dr. R R and Dr. S R Technical University
Completed Date: 2017
Abstract: Cloud computing facilitates extremely scalable services that can be consumed over the internet. An important aspect of the cloud services is that the user data are stored remotely in unknown machines in which users do not posses or manage. Data security and integrity is an important research area during the last few years. Cloud computing gives virtual environment that allows cloud users to access the resources of the cloud in a convenient and on-demand manner. Since the data are stored remotely, we have to keep in mind that sensitive cloud data have to be encrypted before they are outsourced to the commercial public cloud, which makes efficient data utilization service. newline The first part of the work presented in this thesis is top n file retrieval using cluster based ranking method. Searchable encryption file retrieval technique allows users to securely search over encrypted data through search word. Ranking the files based on relevance scores greatly enhances system usability by making it possible relevance ranking instead of sending unwanted results and further ensures the file retrieval accuracy. In this study, we are developing an automated system for both named and unnamed documents based on the clustering algorithms. We implement the ranking and searching algorithm to retrieve top n files. The resulting design is able to provide efficient ranking which will reduce the search time drastically and reduce the communication overhead. The mapping and encryption algorithms protect document against an outside attacker and prevent an untrusted cloud data provider from learning data. newline The second part of the work presented in this thesis is a secure key management for efficient data sharing in cloud computing. Security solution for cloud centric PC s was consistent in providing the on-demand services. Cloud infrastructure is flexible and scalable in all aspects; hence an enhanced level of security mechanism is desirable for secured file transfer. The common way to protect data before outsourcing the da
URI: http://hdl.handle.net/10603/173820
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
abstract.pdfAttached File184.1 kBAdobe PDFView/Open
chapter 1.pdf464.71 kBAdobe PDFView/Open
chapter_2.pdf114.09 kBAdobe PDFView/Open
chapter_3.pdf426.64 kBAdobe PDFView/Open
chapter_4.pdf353.59 kBAdobe PDFView/Open
chapter_5.pdf795.77 kBAdobe PDFView/Open
chapter_6.pdf55.99 kBAdobe PDFView/Open
curriculum_vitae.pdf45.86 kBAdobe PDFView/Open
first pages.pdf534.42 kBAdobe PDFView/Open
list_of_publications.pdf48.92 kBAdobe PDFView/Open
references.pdf77.76 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: