Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/307101
Title: | Design and Evaluation of Data Security Technique to Preserve Confidentiality in Cloud Computing |
Researcher: | Deepak Garg |
Guide(s): | Shalli Rani |
Keywords: | Automation and Control Systems Computer Science Engineering and Technology |
University: | Chitkara University, Punjab |
Completed Date: | 2020 |
Abstract: | newlineCloud computing has gained so much interest in very less span of time. it newlineis now a hot topic of research. Industries and academia have saved a lot of newlineefforts and money using cloud services. It is also an area of interest of the newlineattackers too. Attackers are applying new techniques to steal information newlineof industries and consumers from the cloud, also they are damaging or newlinecorrupting them. Cloud data security is a big challenge these days. As per newlinea report, 31% of the companies considered SaaS applications are less newlinesecured than their internal systems. In another report, it is expected that newlinethere will be a 44% increase in cloud expenditure by the end of the year. newlineCyber-Physical Systems (CPS) integrate the dynamics of the physical newlineprocesses with software and networking. CPS can be connected with cloud newlinecomputing as it provides low-cost storage resources and the flexibility of newlinecustomizing the environment according to the complex industrial newlineapplications. Among other challenges, Secure data access control is the newlinemost intimidating challenge in cloud-based CPS. To overcome these newlinechallenges, a Dynamic Hybrid Secure Encryption (DHSE) technique is newlineproposed, which combines three encryption schemes Advanced newlineEncryption Standard (AES), Identity-Based Encryption (IBE) and newlineAttribute-Based Encryption (ABE). The proposed scheme provides newlineconfidentiality with minimum encryption and decryption time. The newlineproposed work has three stages; data distribution, encryption, and data newlineretrieval. In data distribution, the input is pre-processed and divided into newlinecategories based upon the sensitivity of the data. |
Pagination: | |
URI: | http://hdl.handle.net/10603/307101 |
Appears in Departments: | Faculty of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
1. title.pdf | Attached File | 13.39 kB | Adobe PDF | View/Open |
2. certificate.pdf | 93.45 kB | Adobe PDF | View/Open | |
3. preliminary pages.pdf | 106.28 kB | Adobe PDF | View/Open | |
4. abstract.pdf | 32.07 kB | Adobe PDF | View/Open | |
5. chapter 1.pdf | 1.06 MB | Adobe PDF | View/Open | |
5. chapter 2.pdf | 161.9 kB | Adobe PDF | View/Open | |
5. chapter 3.pdf | 539.61 kB | Adobe PDF | View/Open | |
5. chapter 4.pdf | 253.6 kB | Adobe PDF | View/Open | |
5. chapter 5.pdf | 521.68 kB | Adobe PDF | View/Open | |
5. chapter 6.pdf | 12.28 kB | Adobe PDF | View/Open | |
6. reference.pdf | 156.42 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 198.9 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: