Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/333842
Title: | A security framework with authentication group key management confidentiality and integrity mechanisms for data sharing in the cloud |
Researcher: | Santhi S |
Guide(s): | Sheba Kezia Malarchelcvi P D |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Security Framework Authentication Group Key Management Cloud Computing Integrity Mechanisms Data Sharing |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | With the advent of the technological revolutions in cloud computing storing of data in the cloud has become widespread This very explosion in the usage of cloud storage poses a serious threat to the security of sensitive data in the cloud due to the multitenancy characteristic of the cloud The users fear that their control on data is lost because of the data being stored in the cloud Providing security to the cloud data at rest/transit and addressing scalability are major issues in the cloud Many techniques have been proposed by various researchers in the area of cloud security However these techniques focus on addressing a particular security issue rather than providing an integrated solution Hence the aim of this research work is to develop a security framework that incorporates mechanisms to efficiently address data security issues of the cloud namely confidentiality and integrity as well as user authentication The work also includes a group key distribution mechanism that ensures backward secrecy forward secrecy and scalability of key distribution for the secure data storage in the cloud The proposed security framework encompasses a novel Compressed Trie based Group Key Distribution CTGKD mechanism that addresses the scalability issue and communication overhead in key management a modified Elliptic Curve Diffie Hellman ECDH based authentication mechanism which provides robust authentication a Self Similar Key Generation SSKG based Elliptic Curve Cryptography mechanism that ensures confidentiality and a Chinese Remainder Theorem Key Generation based keyed Hashing for Message Authentication Code CRTK HMAC mechanism for preserving integrity of data stored in the cloud newline |
Pagination: | xix, 142p. |
URI: | http://hdl.handle.net/10603/333842 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 24.15 kB | Adobe PDF | View/Open |
02_certificates.pdf | 3.03 MB | Adobe PDF | View/Open | |
03_abstracts.pdf | 204.85 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 678.02 kB | Adobe PDF | View/Open | |
05_contents.pdf | 208.54 kB | Adobe PDF | View/Open | |
06_listoftables.pdf | 320.71 kB | Adobe PDF | View/Open | |
07_listoffigures.pdf | 323.39 kB | Adobe PDF | View/Open | |
08_listofabbreviations.pdf | 332.43 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 588.1 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 477.1 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 846.05 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 813.21 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 692.08 kB | Adobe PDF | View/Open | |
14_conclusion.pdf | 214.27 kB | Adobe PDF | View/Open | |
15_references.pdf | 363.79 kB | Adobe PDF | View/Open | |
16_listofpublications.pdf | 320.89 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 186.2 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: