Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/256191
Title: Performance analysis of authorization and attribute based encryption techniques for secured cloud data services
Researcher: Muthusamy P
Guide(s): Murali Bhaskaran V
Keywords: Attribute Based Encryption
Cloud Data Services
Engineering and Technology,Computer Science,Computer Science Information Systems
University: Anna University
Completed Date: 2018
Abstract: Cloud Computing (CC) is a promising technology which provides different types of services to the users. The cloud data owners are possible to transmit their message safely to the cloud with enhanced security level. The confidentiality based communication among cloud users and service providers is significant for secured data communication in a cloud environment. Recently, many research works have been developed for improving the security while communicating the data through the cloud. But, the KP-ABE scheme lessens the security and confidentiality of outsourced data because of unauthorized access in CC. Therefore, this research work focuses on developing the secured message communication with higher confidentiality level and the reduced communication overhead for cloud service provisioning. Mediated Certificate Less Public Key Encryption (mCL-PKE) which was introduced to encrypt the sensitive data based on generated public keys by access control strategy and then decrypt the part of encrypted data, depended on successful authentication. But, overall overhead and computational cost was enhanced while managing the multiple users on public clouds. Ranked Searchable Symmetric Encryption Scheme was intended to utilize efficient server-side ranking with minimum loss of any privacy of keyword. However, due to the unauthorized access in cloud, the user provides the computational cost and security issues. In order to improve the security level, the secure dynamic scheme was planned for generating the key with data members without utilizing the communication channel. Yet, the aspect of decreasing the computation cost with minimum key generation time was not considered. newline newline newline
Pagination: xxii, 172p.
URI: http://hdl.handle.net/10603/256191
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File24.53 kBAdobe PDFView/Open
02_certificates.pdf505.79 kBAdobe PDFView/Open
03_abstract.pdf92.28 kBAdobe PDFView/Open
04_acknowledgement.pdf81.08 kBAdobe PDFView/Open
05_table of contents.pdf106.35 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf989.59 kBAdobe PDFView/Open
07_chapter1.pdf262.62 kBAdobe PDFView/Open
08_chapter2.pdf1.02 MBAdobe PDFView/Open
09_chapter3.pdf1.06 MBAdobe PDFView/Open
10_chapter4.pdf1.28 MBAdobe PDFView/Open
11_chapter5.pdf1.23 MBAdobe PDFView/Open
12_chapter6.pdf1.12 MBAdobe PDFView/Open
13_conclusion.pdf173.65 kBAdobe PDFView/Open
14_references.pdf194.36 kBAdobe PDFView/Open
15_list_of_publications.pdf160.34 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: