Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/324261
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2021-05-04T05:59:20Z | - |
dc.date.available | 2021-05-04T05:59:20Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/324261 | - |
dc.description.abstract | The cloud computing is a paradigm that allows on-demand access to user to share computing newlineresources, which has advantages of flexibility, efficiency, scalability, integration and capital newlinereduction. It has three service models namely IaaS, PaaS and SaaS and also three deployment newlinemodel Public, Private and Hybrid. Now-a-days cloud system is used for storing a large amount newlineof data. It is likely hood that the user may have fear that his sensitive information may be shared newlineby others and his trading secrets might be leaked. Under these circumstances, it is necessary to newlinemake the information system dependable and assuring by safe guarding data from spiteful newlineattack. Although the cloud model is very adaptable and provide immediate allocation for the newlinecloud services, but it may suffer actuate problem of secure architecture. Hence, it may not be newlinepossible to make a full confidence on cloud based services as they may pose serious obstacles newlinefrom malicious attack on cloud base storage. The protections schemes are mainly user newlinecrystalline. Hence, security of the data is the main issue in cloud storage which controls and newlineprevents data access to unauthorized users. There are many security issues in cloud computing newlinenamely identity management system, Physical and personnel security, Integrity, Confidentiality, newlineApplication security etc. newlineThe cloud computing involves risks to privacy and security of the data which cannot be ignored. newlineEach part of the cloud computing is to be examined at the various level from the risk point of newlineview. Some of them can be eliminated through available technology investment newlinetools, while others may not be solved and may need careful attention. newline A comprehensive review of the published literature related to the architecture security aspects newlineand data access control schemes have been carried out. The different phases of evolution of newlinecloud computing has been mentioned. It explores related work and existing approaches for newlinesecuring data sharing in cloud. | |
dc.format.extent | ||
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Analysis of Data Access Mechanisms and Security In Private Cloud | |
dc.title.alternative | ||
dc.creator.researcher | Soni, Kritika | |
dc.subject.keyword | Cloud computing | |
dc.subject.keyword | Computer Sceience and Engineering | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Information Systems | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Virtualization | |
dc.description.note | Cloud computing, ABE, Encryption, Decryption, Cipher text policy, RBAC, ABAC, Risk awareness RBAC, Hash function | |
dc.contributor.guide | Suresh Kumar | |
dc.publisher.place | Faridabad | |
dc.publisher.university | Manav Rachna International University | |
dc.publisher.institution | Department of Computer Science Engineering | |
dc.date.registered | 2012 | |
dc.date.completed | 2019 | |
dc.date.awarded | 2019 | |
dc.format.dimensions | ||
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
010_chapter 2.pdf | Attached File | 169.21 kB | Adobe PDF | View/Open |
011_chapter 3.pdf | 565.51 kB | Adobe PDF | View/Open | |
012_chapter 4.pdf | 475.31 kB | Adobe PDF | View/Open | |
013_chapter 5.pdf | 3.54 MB | Adobe PDF | View/Open | |
014_appendix a.pdf | 81.91 kB | Adobe PDF | View/Open | |
015_simalrity index report.pdf | 3.32 MB | Adobe PDF | View/Open | |
01_title.pdf | 18.54 kB | Adobe PDF | View/Open | |
02_ certificate.pdf | 129.48 kB | Adobe PDF | View/Open | |
03_ acknowledgement.pdf | 11.1 kB | Adobe PDF | View/Open | |
04_ list of publications.pdf | 13.91 kB | Adobe PDF | View/Open | |
06_ table of contents.pdf | 22.06 kB | Adobe PDF | View/Open | |
07_ list of tables and figures.pdf | 48.28 kB | Adobe PDF | View/Open | |
08_list of abbreviations.pdf | 21.65 kB | Adobe PDF | View/Open | |
09_chapter 1.pdf | 453.29 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 88.39 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: