Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/329486
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialComputer Science-
dc.date.accessioned2021-06-25T09:49:05Z-
dc.date.available2021-06-25T09:49:05Z-
dc.identifier.urihttp://hdl.handle.net/10603/329486-
dc.description.abstractThe Cloud Computing, one of today s most powerful technologies, can reduce costs associated with computing as it is increasingly flexible and scalable for computer processes. Users are unknown about their data stored on a cloud. Since a few years, cloud computing has grown to one of the fastest-growing parts of the IT industry. Due to the outsourcing of enterprise IT assets being hosted on third-party cloud computing platforms, results in a loss of security control over the cloud-hosted assets. Moreover, the lack of security constraints in the Service Level Agreement (SLA) between cloud providers and customers results in a little loss of trust. Security being the major issue for public cloud, it hampers the growth of the same. Several methodologies are introduced for data security in the cloud. However, still few organizations have less trust in cloud providers due to the lack of backup recovery and data privacy (Data theft is also main issue) related concerns. Different cloud service providers offer many services to users like Computing, Storage, Database, Payment, Billing, Email, Web applications, Infrastructure and other Business Process Management. Every application has a different pricing model according to its services. Pricing Model, Server OS can be different with deployment model too. One of the major objective of all service providers is to secure data resided in the cloud. newline newlineFor building cloud infrastructure, virtualization is a core component used to separate a single physical machine into multiple virtual machines in a cost-effective way. With so many benefits there are few issues which should be solved. Implementation of virtualization involves a high degree of uncertainty and consequently, a great possibility of failures. Even after providing many security features, may service providers are still facing some security related issues. To enhance security in cloud-based applications, in this research a novel model (Tortoise model) is proposed to enhance the security of data stored in the cloud.-
dc.format.extent--
dc.languageEnglish-
dc.relationCloud Computing-
dc.rightsuniversity-
dc.titleAnalysis of virtualization security threats and a novel model for data security in cloud computing-
dc.creator.researcherPopat, B. J.-
dc.subject.keywordCloud Computing-
dc.subject.keywordComputer Science-
dc.subject.keywordComputer Science Cybernetics-
dc.subject.keywordData Security in Cloud Computing-
dc.subject.keywordEngineering and Technology-
dc.subject.keywordHashing-
dc.subject.keywordMD5-
dc.subject.keywordPBKDF2-
dc.subject.keywordTortoise Algorithm-
dc.subject.keywordVirtualization issues-
dc.description.noteReferences p. 106-110, Appendix p. 112-114-
dc.contributor.guidePatel, Kuntal P.-
dc.publisher.placeRajkot-
dc.publisher.universityRK University-
dc.publisher.institutionFaculty of Technology-
dc.date.registered2015-
dc.date.completed2021-
dc.date.awarded2021-
dc.format.dimensions--
dc.format.accompanyingmaterialNone-
dc.source.universityUniversity-
dc.type.degreePh.D.-
Appears in Departments:Faculty of Technology

Files in This Item:
File Description SizeFormat 
01_coverpage.pdfAttached File17.74 kBAdobe PDFView/Open
02_certificate.pdf138.95 kBAdobe PDFView/Open
03_declaration.pdf90.82 kBAdobe PDFView/Open
04_acknowledgement.pdf70.06 kBAdobe PDFView/Open
05_table of contents.pdf196.97 kBAdobe PDFView/Open
06_list of tables.pdf111.02 kBAdobe PDFView/Open
07_list of figures.pdf117.78 kBAdobe PDFView/Open
08_list of abbreviations.pdf63.9 kBAdobe PDFView/Open
09_abstract.pdf63.87 kBAdobe PDFView/Open
10_graphical abstract.pdf71.43 kBAdobe PDFView/Open
11_chapter1.pdf347.16 kBAdobe PDFView/Open
12_chapter2.pdf358.71 kBAdobe PDFView/Open
13_chapter3.pdf548.23 kBAdobe PDFView/Open
14_chapter4.pdf492.77 kBAdobe PDFView/Open
15_chapter5.pdf1.05 MBAdobe PDFView/Open
16_chapter6.pdf1.05 MBAdobe PDFView/Open
17_chapter7.pdf94.19 kBAdobe PDFView/Open
18_list of publications.pdf62.43 kBAdobe PDFView/Open
19_references.pdf93.11 kBAdobe PDFView/Open
20_appendix.pdf241.5 kBAdobe PDFView/Open
80_recommendation.pdf112.03 kBAdobe PDFView/Open
urkund report - bansi popat thesis.pdf34.21 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: