Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/334515
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | An efficient hybrid approach to Enhance data security through Improving detection of data integrity Violations using matrix dialing Method on cloud storage | |
dc.date.accessioned | 2021-08-03T09:19:56Z | - |
dc.date.available | 2021-08-03T09:19:56Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/334515 | - |
dc.description.abstract | Cloud Computing is a paradigm using a network of remote servers rather than a personal computer. It has become more popular withwidespread acceptance due to quality of services, cost-effectiveness, time saving, easy to scale up/down, and efficient utilization of computing resources with pay as use model. However, data security issues such as integrity and confidentiality of dataare the major obstacles holding the widespread adoption of cloud technology.By considering all the concerns about data security issues, the primary aim of this work is to develop a single hybrid security model encompassing confidentiality and integrity of data without using Third Party Auditor (TPA).This thesis provides three levelsof checking namely,the first aspect focuses on ensuring data integrity. In order to achieve this, violations are detected on each block of data based on Determinant Factor (DF). The results show that, the proposed method outperforms in terms of memory utilization (i.e.) number of bits used for DF value and also accuracy of data. The second aspect of the proposed research work generates encrypted signature on DF (obtained as output from the first phase) using the combination of hashing and cryptographic algorithm under two scenarios namely: Hashing then Cryptography and Cryptographythen Hashing toachieve data confidentiality. This work gives better performancein terms of execution time and throughput.The third aspect of the proposed research work enhances data security using color coding on encrypted signature of each block of data (obtained as output from the second phase). This contribution supports data security in terms of perfectness of recoloring and restricts unauthorized access during the transmission of data. Each data are specified by a unique color by both the user and Cloud Service Provider (CSP) and it helps to protect and avoid manipulation of original data. The result shows better performance in terms of security performance by avoiding unauthorized access of data.The experimental results show that the proposed solution can be used practically and efficiently in cloud environmentand they ensure lower computation time (i.e.) time taken for splitting of data blocks into coloring on the signature without involving a TPA. newline | |
dc.format.extent | xiv, 157p. | |
dc.language | English | |
dc.relation | p.146-156 | |
dc.rights | university | |
dc.title | An efficient hybrid approach to Enhance data security through Improving detection of data integrity Violations using matrix dialing Method on cloud storage | |
dc.title.alternative | ||
dc.creator.researcher | Prem kumar P | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Software Engineering | |
dc.subject.keyword | cloud storage | |
dc.subject.keyword | data security | |
dc.description.note | ||
dc.contributor.guide | Shanthi D | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2020 | |
dc.date.awarded | 2020 | |
dc.format.dimensions | 21cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 37.44 kB | Adobe PDF | View/Open |
02_certificates.pdf | 72.04 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 72.59 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 96.48 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 17.27 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 30.41 kB | Adobe PDF | View/Open | |
07_contents.pdf | 24.37 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 15.7 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 16.86 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 15.97 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 147.71 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 161.91 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 169.42 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 165.67 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 323.68 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 278.76 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 53.17 kB | Adobe PDF | View/Open | |
18_references.pdf | 73.77 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 44.65 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 76.25 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: