Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/202865
Title: | Development of Confidentiality Integrity Authentication Model for Assuring Data Security in Cloud Computing |
Researcher: | Veeralakshmi P. |
Guide(s): | Dr. Latha Tamilselvan |
Keywords: | Confidentiality, Integrity, Authentication Model, Data Security, Cloud Computing |
University: | B S Abdur Rahman University |
Completed Date: | 03/04/2018 |
Abstract: | Cloud can be envisioned as a working model for providing an environment which enables the cloud users to access a shared pool of newlinevirtualized and configurable computing resources that can be easily provisioned as services on the pay-per-use manner from the cloud service newlineproviders. Amongst the services, the cloud storage services gain more newlineattraction due to the growth of digital data at an incredible rate. By utilizing newlinethe cloud storage services, the cloud users can be relieved from the burden newlineof local data storage and maintenance. But, the users are unaware of the newlineexact location of the remotely stored data. This unique feature imposes many newlinesecurity challenges like data theft, damage of information, disruption of newlineservices, loss of privacy, etc., on the data stored in the cloud. In order to newlinealleviate the challenges, this research aims at developing a CIA newline(Confidentiality, Integrity and Authentication) model for cloud computing so newlinethat the data stored in the cloud are confidential, integral and authenticated. newlineCloud users depend on cloud for storage of massive amount of data. newlineBefore storing the data, the data owner should imply the proper security newlinemechanism that ensures confidentiality, integrity and authentication in order newlineto protect the stored data from unauthorized access. In cloud, confidentiality newlineof data can be compromised by applying the attacks like data leakage, newlinephishing and eavesdropping. To overcome this, this research aims at newlinedeveloping a new encryption algorithm called 2-keys symmetric encryption newlinealgorithm that can be used for the encryption of massive data. This newlineencryption procedure incurs lesser computation overhead and minimum time newlinefor performing encryption and decryption. newlineData integrity is ensured by generating the metadata for the data to be newlinestored in cloud by utilizing the position of individual characters of the data newlineblocks. This metadata is attached to the encrypted data blocks and is stored newlinein the cloud storage servers. Then, the originality of data can be verified by newlinethe data owner |
Pagination: | 162 |
URI: | http://hdl.handle.net/10603/202865 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
abtract.pdf | Attached File | 107.99 kB | Adobe PDF | View/Open |
chapter 1.pdf | 359.08 kB | Adobe PDF | View/Open | |
chapter 2.pdf | 353.56 kB | Adobe PDF | View/Open | |
chapter 3.pdf | 716.57 kB | Adobe PDF | View/Open | |
chapter 4.pdf | 744.18 kB | Adobe PDF | View/Open | |
chapter 5.pdf | 992.5 kB | Adobe PDF | View/Open | |
chapter 6.pdf | 509.37 kB | Adobe PDF | View/Open | |
chapter 7.pdf | 104.97 kB | Adobe PDF | View/Open | |
references.pdf | 230.58 kB | Adobe PDF | View/Open | |
table of contents.pdf | 247.13 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: