Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/254818
Title: Data outsourcing and transaction security in cloud environment
Researcher: Neela K L
Guide(s): Kavitha V
Keywords: Cloud Environment
Engineering and Technology,Computer Science,Computer Science Information Systems
Transaction Security
University: Anna University
Completed Date: 2018
Abstract: Cloud computing is one of the prominent areas in today s world. It is used to deliver the computing services such as networking, software etc over the Internet. There are several advantages that exist in cloud computing but the major drawback is that it is difficult to build a secure cloud storage system. Additionally, cloud environment are controlled by several service providers who are semi- trusted, and also hackers are possible to attack the service providers easily without the knowledge of the owner. Cloud environment provides security depending upon the centralized third party provider and hence the data confidentiality has to be compromised. Data confidentiality and integrity are the key terms of security and privacy. Data confidentiality represents to keep the sensitive data secure. Data integrity provides assurance to the information which is mainly used to improve the privacy of the data. Data confidentiality can be assured by using cryptographic method. There are many cryptographic methods available, but every algorithm has its drawbacks in terms of time complexity, various attacks, etc. The thesis commences with the construction of a secure cloud storage system in a decentralized way. Though service providers are there, the data owner holds full control over the data. Without the awareness of the data owner, the service provider cannot access the data. Users who want to retrieve the file send the request to the cloud service provider. The cloud service provider retrieves the file only with the knowledge of the data owner. The data owner is the deciding authority as to with whom the data can be shared. If the data owner is offline, then through notification system such as SMS, the cloud service provider sends the request to data owner in order to retrieve the file. newline newline newline
Pagination: xvii, 117p.
URI: http://hdl.handle.net/10603/254818
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.42 kBAdobe PDFView/Open
02_certificates.pdf688.3 kBAdobe PDFView/Open
03_abstract.pdf287.15 kBAdobe PDFView/Open
04_acknowledgement.pdf183.36 kBAdobe PDFView/Open
05_table of contents.pdf359.81 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf178.08 kBAdobe PDFView/Open
07_chapter1.pdf380.1 kBAdobe PDFView/Open
08_chapter2.pdf337.26 kBAdobe PDFView/Open
09_chapter3.pdf379.69 kBAdobe PDFView/Open
10_chapter4.pdf1.04 MBAdobe PDFView/Open
11_chapter5.pdf512.98 kBAdobe PDFView/Open
12_chapter6.pdf377.82 kBAdobe PDFView/Open
13_conclusion.pdf185.19 kBAdobe PDFView/Open
14_references.pdf468.43 kBAdobe PDFView/Open
15_list_of_publications.pdf294.46 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: