Please use this identifier to cite or link to this item:
Title: Efficient privacy preserving data sanitization over cloud using optimal algorithms
Researcher: Renuga S
Guide(s): Jagatheeswari P
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
University: Anna University
Completed Date: 2020
Abstract: Cloud computing (CC) is a complex infrastructure of software,hardware, processing and storage that are available as a service. CC has been envisioned as the next-generation architecture for IT enterprise. While most of the CC offerings might appear enticing, there remain issues of reliability,portability, privacy, and security. The complete benefits of CC can be experienced when acknowledging and solving the real privacy and security concerns those are come along with storing sensitive and personal information in databases and software scattered around the Internet. One of the main concerns in CC is privacy-preserving, which is the process of covering up personal or sensitive data related to a single user from other users and parties. In cloud computing, the privacy of data stored is very much desirable as the data can be of any information related to the identity of a user. The leakage or violation of any such privacy might cause the major failure of the system. The proper safeguards have to be taken to prevent unauthorized users from accessing data, disclose, copy, use or modify any of the personal information. As there is no standard approach for CC security, third-party arrangements can be utilized. Data sanitization is a crucial part of privacy-preserving in cloud computing. Data sanitization removes some part of data from the original resource subsequently it was offered for other users. The most important step in the sanitization approach is to guarantee that the data was removed from the cloud service provider. When all the files are sanitized and all possibilities of embedded threats are eliminated, every file-based threat will be disarmed by data sanitization without the requirement of the detection process. When the implementation of data sanitization is poor, then there is a chance for data loss. Here, the data sanitization approach for privacy preserving in the cloud has been presented. newline
Pagination: xvi,123p.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.28 kBAdobe PDFView/Open
02_certificates.pdf434.8 kBAdobe PDFView/Open
03_vivaproceedings.pdf1.75 MBAdobe PDFView/Open
04_bonafidecertificate.pdf168.94 kBAdobe PDFView/Open
05_abstracts.pdf15.17 kBAdobe PDFView/Open
06_acknowledgements.pdf195.28 kBAdobe PDFView/Open
07_contents.pdf8.35 kBAdobe PDFView/Open
08_listoftables.pdf3.31 kBAdobe PDFView/Open
09_listoffigures.pdf5.56 kBAdobe PDFView/Open
10_listofabbreviations.pdf14.24 kBAdobe PDFView/Open
11_chapter1.pdf221.85 kBAdobe PDFView/Open
12_chapter2.pdf266.42 kBAdobe PDFView/Open
13_chapter3.pdf280.42 kBAdobe PDFView/Open
14_chapter4.pdf285.39 kBAdobe PDFView/Open
15_chapter5.pdf207.07 kBAdobe PDFView/Open
16_conclusion.pdf21.88 kBAdobe PDFView/Open
17_references.pdf537.74 kBAdobe PDFView/Open
18_listofpublications.pdf28.87 kBAdobe PDFView/Open
80_recommendation.pdf62.4 kBAdobe PDFView/Open
Show full item record

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: