Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/299278
Title: Performance analysis of identity authentication and certificateless signcryption techniques for secured cloud data storage and communication
Researcher: Jawahar M
Guide(s): Sabari A
Keywords: Engineering and Technology
Computer Science
Computer Science Software Engineering
cloud data
signcryption
University: Anna University
Completed Date: 2019
Abstract: Cloud computing is a development of internet based system which offers wide range of computing resources over the internet to users. The end users obtain cloud services via web browser when the cloud data or information is stored on server. In cloud environment, the achieving of secured data storage communication is the significant challenging task due to the presence of attacks (unauthorized users). Secure data communication is needs to be addressed in emerging trends and evolution of cloud applications. In cloud, the detection of attacks is a major concern while accessing the data. Besides, the balancing of load among multiple cloud servers needs to be performed due to the increase of user requests on cloud server. Many of existing works were developed to perform the data communication on cloud environment. But, the efficiency of attack detection and load balancing did not improved at the essential level. Consequently, the proposed research work is concentrated on performance of secured cloud communication by identifying the intrusion attack and balancing the load with less amount of time also analysis the space complexity, time complexity and data accessing time. The main objective of existing Energy-Aware Load Balancing and Scaling Algorithm (EALBSA) carried out the energy aware load balancing and application scaling on cloud environment. It failed to detect the attacks which lead to minimize the load balancing on cloud due to its computational limitations. The introduction of existing system New Effective Data Access Control system for Multi Authority Cloud Storage systems (NEDAC-MACS) leads to attain the attribute revocation in a secured manner. The detection of attacks needs to be improved in order to enhance the security level newline
Pagination: xxv, 200p.
URI: http://hdl.handle.net/10603/299278
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File70.58 kBAdobe PDFView/Open
02_certificates.pdf1.06 MBAdobe PDFView/Open
03_abstracts.pdf30.15 kBAdobe PDFView/Open
04_acknowledgements.pdf12.86 kBAdobe PDFView/Open
05_contents.pdf52.09 kBAdobe PDFView/Open
06_listofabbreviations.pdf54.05 kBAdobe PDFView/Open
07_chapter1.pdf494.04 kBAdobe PDFView/Open
08_chapter2.pdf235.29 kBAdobe PDFView/Open
09_chapter3.pdf474.6 kBAdobe PDFView/Open
10_chapter4.pdf609.56 kBAdobe PDFView/Open
11_chapter5.pdf634.31 kBAdobe PDFView/Open
12_chapter6.pdf831.27 kBAdobe PDFView/Open
13_conclusion.pdf65.91 kBAdobe PDFView/Open
14_references.pdf101.07 kBAdobe PDFView/Open
15_listofpublications.pdf52.84 kBAdobe PDFView/Open
80_recommendation.pdf117.54 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: