Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/324261
Title: Analysis of Data Access Mechanisms and Security In Private Cloud
Researcher: Soni, Kritika
Guide(s): Suresh Kumar
Keywords: Cloud computing
Computer Sceience and Engineering
Computer Science
Computer Science Information Systems
Engineering and Technology
Virtualization
University: Manav Rachna International University
Completed Date: 2019
Abstract: The cloud computing is a paradigm that allows on-demand access to user to share computing newlineresources, which has advantages of flexibility, efficiency, scalability, integration and capital newlinereduction. It has three service models namely IaaS, PaaS and SaaS and also three deployment newlinemodel Public, Private and Hybrid. Now-a-days cloud system is used for storing a large amount newlineof data. It is likely hood that the user may have fear that his sensitive information may be shared newlineby others and his trading secrets might be leaked. Under these circumstances, it is necessary to newlinemake the information system dependable and assuring by safe guarding data from spiteful newlineattack. Although the cloud model is very adaptable and provide immediate allocation for the newlinecloud services, but it may suffer actuate problem of secure architecture. Hence, it may not be newlinepossible to make a full confidence on cloud based services as they may pose serious obstacles newlinefrom malicious attack on cloud base storage. The protections schemes are mainly user newlinecrystalline. Hence, security of the data is the main issue in cloud storage which controls and newlineprevents data access to unauthorized users. There are many security issues in cloud computing newlinenamely identity management system, Physical and personnel security, Integrity, Confidentiality, newlineApplication security etc. newlineThe cloud computing involves risks to privacy and security of the data which cannot be ignored. newlineEach part of the cloud computing is to be examined at the various level from the risk point of newlineview. Some of them can be eliminated through available technology investment newlinetools, while others may not be solved and may need careful attention. newline A comprehensive review of the published literature related to the architecture security aspects newlineand data access control schemes have been carried out. The different phases of evolution of newlinecloud computing has been mentioned. It explores related work and existing approaches for newlinesecuring data sharing in cloud.
Pagination: 
URI: http://hdl.handle.net/10603/324261
Appears in Departments:Department of Computer Science Engineering

Files in This Item:
File Description SizeFormat 
010_chapter 2.pdfAttached File169.21 kBAdobe PDFView/Open
011_chapter 3.pdf565.51 kBAdobe PDFView/Open
012_chapter 4.pdf475.31 kBAdobe PDFView/Open
013_chapter 5.pdf3.54 MBAdobe PDFView/Open
014_appendix a.pdf81.91 kBAdobe PDFView/Open
015_simalrity index report.pdf3.32 MBAdobe PDFView/Open
01_title.pdf18.54 kBAdobe PDFView/Open
02_ certificate.pdf129.48 kBAdobe PDFView/Open
03_ acknowledgement.pdf11.1 kBAdobe PDFView/Open
04_ list of publications.pdf13.91 kBAdobe PDFView/Open
06_ table of contents.pdf22.06 kBAdobe PDFView/Open
07_ list of tables and figures.pdf48.28 kBAdobe PDFView/Open
08_list of abbreviations.pdf21.65 kBAdobe PDFView/Open
09_chapter 1.pdf453.29 kBAdobe PDFView/Open
80_recommendation.pdf88.39 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: