Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/283372
Title: | Effective methodologies for enhancing security to outsourced data in cloud computing environment |
Researcher: | Ahamed ali S |
Guide(s): | Ramakrishnan M |
Keywords: | Engineering and Technology,Computer Science,Computer Science Information Systems |
University: | Anna University |
Completed Date: | 2019 |
Abstract: | Cloud computing has grown in the last few years from a promising business concept to one of the fastest growing segments of IT Enterprise. It is a technology which provides computation, software, data accessand storage services.This technology does not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud resources are delivered to the end-users through Web services. In the current scenario, organizations produce a large amount of information that includes personal data, health records and financial information. These organizations expect effective security, availability, scalability and durability for the critical and sensitive data. Many organizations are using cloud storage for storing their information because of the attractive features offered by cloud computing.Enterprises enjoy on-demand high quality services offered by the cloud service providers by storing data in the cloud servers. The data or the information stored in a cloud server is referred as data outsourcing and they are managed by the cloud service providers. Organizations delegate the storage and management of their data by outsourcing data storage,to a Cloud Service Provider (CSP) with pre-defined Service Level Agreements(SLAs) that include payment of fees calculated in GB/month. Migrating data to the cloud servers is a cause of serious concern on data confidentiality and integrity since users may not retain a local copy of outsourced data.Data owners no longer physically possess their sensitive data in this storage model and it has raised new security challenges. Security violations include data loss, unauthorized data access and modifications. Efficient verification and validation of the data in the cloud servers has become a great challenge. The traditional methods used to achieve confidentiality and integrity cannot be directly adopted in the cloud as the data is stored and accessed from a remote site. newline |
Pagination: | xvii, 148p. |
URI: | http://hdl.handle.net/10603/283372 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 162.8 kB | Adobe PDF | View/Open |
02_certificate1.pdf | 223.54 kB | Adobe PDF | View/Open | |
03_certificate2.pdf | 155.88 kB | Adobe PDF | View/Open | |
04_certificate3.pdf | 382.73 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 247.41 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 142.82 kB | Adobe PDF | View/Open | |
07_contents.pdf | 151.75 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 247.46 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 285.92 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 345.39 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 1.35 MB | Adobe PDF | View/Open | |
12_chapter2.pdf | 918.72 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 1.19 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 830.64 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 714.25 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 274.54 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 277.62 kB | Adobe PDF | View/Open | |
18_references.pdf | 406.01 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 249.24 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: