Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/337360
Title: | Efficient privacy preserving data sanitization over cloud using optimal algorithms |
Researcher: | Renuga S |
Guide(s): | Jagatheeswari P |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Cloud computing (CC) is a complex infrastructure of software,hardware, processing and storage that are available as a service. CC has been envisioned as the next-generation architecture for IT enterprise. While most of the CC offerings might appear enticing, there remain issues of reliability,portability, privacy, and security. The complete benefits of CC can be experienced when acknowledging and solving the real privacy and security concerns those are come along with storing sensitive and personal information in databases and software scattered around the Internet. One of the main concerns in CC is privacy-preserving, which is the process of covering up personal or sensitive data related to a single user from other users and parties. In cloud computing, the privacy of data stored is very much desirable as the data can be of any information related to the identity of a user. The leakage or violation of any such privacy might cause the major failure of the system. The proper safeguards have to be taken to prevent unauthorized users from accessing data, disclose, copy, use or modify any of the personal information. As there is no standard approach for CC security, third-party arrangements can be utilized. Data sanitization is a crucial part of privacy-preserving in cloud computing. Data sanitization removes some part of data from the original resource subsequently it was offered for other users. The most important step in the sanitization approach is to guarantee that the data was removed from the cloud service provider. When all the files are sanitized and all possibilities of embedded threats are eliminated, every file-based threat will be disarmed by data sanitization without the requirement of the detection process. When the implementation of data sanitization is poor, then there is a chance for data loss. Here, the data sanitization approach for privacy preserving in the cloud has been presented. newline |
Pagination: | xvi,123p. |
URI: | http://hdl.handle.net/10603/337360 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 22.28 kB | Adobe PDF | View/Open |
02_certificates.pdf | 434.8 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 1.75 MB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 168.94 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 15.17 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 195.28 kB | Adobe PDF | View/Open | |
07_contents.pdf | 8.35 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 3.31 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 5.56 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 14.24 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 221.85 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 266.42 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 280.42 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 285.39 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 207.07 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 21.88 kB | Adobe PDF | View/Open | |
17_references.pdf | 537.74 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 28.87 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 62.4 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: