Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/333842
Title: A security framework with authentication group key management confidentiality and integrity mechanisms for data sharing in the cloud
Researcher: Santhi S
Guide(s): Sheba Kezia Malarchelcvi P D
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Security Framework
Authentication Group
Key Management
Cloud Computing
Integrity Mechanisms
Data Sharing
University: Anna University
Completed Date: 2020
Abstract: With the advent of the technological revolutions in cloud computing storing of data in the cloud has become widespread This very explosion in the usage of cloud storage poses a serious threat to the security of sensitive data in the cloud due to the multitenancy characteristic of the cloud The users fear that their control on data is lost because of the data being stored in the cloud Providing security to the cloud data at rest/transit and addressing scalability are major issues in the cloud Many techniques have been proposed by various researchers in the area of cloud security However these techniques focus on addressing a particular security issue rather than providing an integrated solution Hence the aim of this research work is to develop a security framework that incorporates mechanisms to efficiently address data security issues of the cloud namely confidentiality and integrity as well as user authentication The work also includes a group key distribution mechanism that ensures backward secrecy forward secrecy and scalability of key distribution for the secure data storage in the cloud The proposed security framework encompasses a novel Compressed Trie based Group Key Distribution CTGKD mechanism that addresses the scalability issue and communication overhead in key management a modified Elliptic Curve Diffie Hellman ECDH based authentication mechanism which provides robust authentication a Self Similar Key Generation SSKG based Elliptic Curve Cryptography mechanism that ensures confidentiality and a Chinese Remainder Theorem Key Generation based keyed Hashing for Message Authentication Code CRTK HMAC mechanism for preserving integrity of data stored in the cloud newline
Pagination: xix, 142p.
URI: http://hdl.handle.net/10603/333842
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File24.15 kBAdobe PDFView/Open
02_certificates.pdf3.03 MBAdobe PDFView/Open
03_abstracts.pdf204.85 kBAdobe PDFView/Open
04_acknowledgements.pdf678.02 kBAdobe PDFView/Open
05_contents.pdf208.54 kBAdobe PDFView/Open
06_listoftables.pdf320.71 kBAdobe PDFView/Open
07_listoffigures.pdf323.39 kBAdobe PDFView/Open
08_listofabbreviations.pdf332.43 kBAdobe PDFView/Open
09_chapter1.pdf588.1 kBAdobe PDFView/Open
10_chapter2.pdf477.1 kBAdobe PDFView/Open
11_chapter3.pdf846.05 kBAdobe PDFView/Open
12_chapter4.pdf813.21 kBAdobe PDFView/Open
13_chapter5.pdf692.08 kBAdobe PDFView/Open
14_conclusion.pdf214.27 kBAdobe PDFView/Open
15_references.pdf363.79 kBAdobe PDFView/Open
16_listofpublications.pdf320.89 kBAdobe PDFView/Open
80_recommendation.pdf186.2 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: