Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/283372
Title: Effective methodologies for enhancing security to outsourced data in cloud computing environment
Researcher: Ahamed ali S
Guide(s): Ramakrishnan M
Keywords: Engineering and Technology,Computer Science,Computer Science Information Systems
University: Anna University
Completed Date: 2019
Abstract: Cloud computing has grown in the last few years from a promising business concept to one of the fastest growing segments of IT Enterprise. It is a technology which provides computation, software, data accessand storage services.This technology does not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud resources are delivered to the end-users through Web services. In the current scenario, organizations produce a large amount of information that includes personal data, health records and financial information. These organizations expect effective security, availability, scalability and durability for the critical and sensitive data. Many organizations are using cloud storage for storing their information because of the attractive features offered by cloud computing.Enterprises enjoy on-demand high quality services offered by the cloud service providers by storing data in the cloud servers. The data or the information stored in a cloud server is referred as data outsourcing and they are managed by the cloud service providers. Organizations delegate the storage and management of their data by outsourcing data storage,to a Cloud Service Provider (CSP) with pre-defined Service Level Agreements(SLAs) that include payment of fees calculated in GB/month. Migrating data to the cloud servers is a cause of serious concern on data confidentiality and integrity since users may not retain a local copy of outsourced data.Data owners no longer physically possess their sensitive data in this storage model and it has raised new security challenges. Security violations include data loss, unauthorized data access and modifications. Efficient verification and validation of the data in the cloud servers has become a great challenge. The traditional methods used to achieve confidentiality and integrity cannot be directly adopted in the cloud as the data is stored and accessed from a remote site. newline
Pagination: xvii, 148p.
URI: http://hdl.handle.net/10603/283372
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File162.8 kBAdobe PDFView/Open
02_certificate1.pdf223.54 kBAdobe PDFView/Open
03_certificate2.pdf155.88 kBAdobe PDFView/Open
04_certificate3.pdf382.73 kBAdobe PDFView/Open
05_abstracts.pdf247.41 kBAdobe PDFView/Open
06_acknowledgements.pdf142.82 kBAdobe PDFView/Open
07_contents.pdf151.75 kBAdobe PDFView/Open
08_listoftables.pdf247.46 kBAdobe PDFView/Open
09_listoffigures.pdf285.92 kBAdobe PDFView/Open
10_listofabbreviations.pdf345.39 kBAdobe PDFView/Open
11_chapter1.pdf1.35 MBAdobe PDFView/Open
12_chapter2.pdf918.72 kBAdobe PDFView/Open
13_chapter3.pdf1.19 MBAdobe PDFView/Open
14_chapter4.pdf830.64 kBAdobe PDFView/Open
15_chapter5.pdf714.25 kBAdobe PDFView/Open
16_chapter6.pdf274.54 kBAdobe PDFView/Open
17_conclusion.pdf277.62 kBAdobe PDFView/Open
18_references.pdf406.01 kBAdobe PDFView/Open
19_listofpublications.pdf249.24 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: