Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/266051
Title: An Efficient Re Encrypted Cryptosystem to Protect Data Security and Confidentiality in Cloud Storage
Researcher: KALAIVANY S.
Guide(s): T. NALINI
University: Vels University
Completed Date: 2018
Abstract: A cloud storage system is having the capacity of storing huge amount of data or information newlineinside its server. The storage server that are presented inside the cloud platform offers the newlineservice of storage for a long period of time. Basically the third party acts an admin for the newlinestorage performance of the cloud system. For this purpose the cloud storage system is newlineinitiated. The major issue of the cloud system is the hacking problems which are easily newlinehacked by some hackers. Common techniques of encryption are applied to prevent the data newlinefrom such hackers. Each code word signs of a communication is stored in the diverse storing newlinesymbol. So as to calculate the uneven code word cyphers for a communication in a dispersed newlinesituation, the deletion coding is executed similar. When the message symbols are kept in the newlinedissimilar storage servers in the dispersed atmosphere, the cryptograph term signs are newlinecalculated individually and kept in the storage servers. Far ahead, a set of features besides the newlinecipher text are categorized and a monotonic key arrangement extended with the decryption newlinekey of the user selects which user is legal for the decryption procedure. The Coarse Grained newlineTechnique directs the decryption key to the third party irrespective of user s information newlinewhile the Fine-grained Technique describes that it condenses the basic for the specialized newlineusers and is recognized as integrated authority. newlineThis procedure is identified as Key Policy Attribute Based Encryption (KP-ABE). So newlineas to overwhelm these downsides, the encryptor chooses the tree admittance strategy which is newlineencrypted by means of the cipher text, however according to the set of features, the decryption newlinekey is produced. This procedure is recognized as Cipher text Policy Attribute Based newlineEncryption which also has the downsides that it does not upkeep the numerous value tasks newlineand the complex features. Furthermore, the data promoting and the data recovery also suits newlinethe concern. A threshold proxy re-encryption system is introduced and incorporate with Fully newlineHomomorphic Encryption is an encouraging method for access control of encrypted data. The newlineproxy re-encryption system deliberates the encrypted messages from the data holder and newlineencrypts it besides frontwards on the way to the receiver or storing server. The complete newlineperformance attains the allocation procedure by protected admittance control. Thus, in this newlineeffort Schmidt-Samoa Public Key Encryption (SSPKE) technique established on Enhanced newlinev newlineBoosting Algorithm (EBA) by Data hiding Architecture is anticipated. Moreover in this effort newlineprocedure of multi-party protocol admission control for operate and access the user s data newlinedeprived of disturbing the delicate cloud data privacy. The experimental outcomes illustrates newlinethe auspicious consequence in term of considering diverse varieties of metrics like overall newlineprocessing time, server response time and data decomposition rate. In today s period of newlineassociation, oppositions are in enormous stress to improve transform and efficacy their IT newlinedevelopments to achieve more with less. All these shortcomings are engaged by new newlinecalculating style called cloud computing. Fundamentally, cloud computing is well-defined as newlineinternet established dispersed effective atmosphere. newlineAt this all types of computational procedures are achieved on cloud above the internet. newlineThe source organization cost is more than the resource s actual cost. Consequently, it is newlinefrequently superior to acquire the essential properties through leasing in residence of newlineacquiring one s individual incomes. The basic description of cloud computing is A dispersed newlineeffective atmosphere bids virtualization established IT-as-Services in rental . Behind all of newlinethese servers for instance Infrastructure-as-a- Service (IaaS), Platform-as-a-Service (PaaS), newlineand cloud too stretches storage as a service, in which dispersed database servers continuously newlineoccur for rent to users. The experimental outcomes displays that the encouraging consequence newlinein term of considering dissimilar types of metrics like Data Packet Delivery Ration, Data newlinePacket Delivery Ration and Data Generation Rate. newline
URI: http://hdl.handle.net/10603/266051
Appears in Departments:Department of computer science & enigineering

Files in This Item:
File Description SizeFormat 
abbreviation.pdfAttached File118.11 kBAdobe PDFView/Open
acknowledgement.pdf4.48 kBAdobe PDFView/Open
certificate.pdf106.54 kBAdobe PDFView/Open
chapter 1.pdf1.11 MBAdobe PDFView/Open
chapter2.pdf1.4 MBAdobe PDFView/Open
chapter 3.pdf1.33 MBAdobe PDFView/Open
chapter 4.pdf1.42 MBAdobe PDFView/Open
chapter 5.pdf1.08 MBAdobe PDFView/Open
chapter 6.pdf91.2 kBAdobe PDFView/Open
contents.pdf75.58 kBAdobe PDFView/Open
publications.pdf2.47 MBAdobe PDFView/Open
references.pdf310.1 kBAdobe PDFView/Open
tab & fig.pdf72.16 kBAdobe PDFView/Open
title.pdf36.66 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: