Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/339502
Title: Enhanced security approach for outsourced data auditing in cloud storage
Researcher: Esther Daniel
Guide(s): Vasanthi, N A
Keywords: Cloud storage
Data auditing
Security
University: Anna University
Completed Date: 2020
Abstract: Cloud Storage prevails over the entire world and makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Data storage is an essential aspect in this era where the data growth is exponential. Enormous sensitive data is stored into the cloud. The dynamic data refers to information that is asynchronously changed as further updates to the information becomes available. There is no assurance that the data outsourced on remote storage servers are safe and not been lost or modified. As the user s data are stored and maintained out of user s premises, these services create concerns of security vulnerabilities for all the services provided by them. Extensive research is carried out to solve the issues with the service providers and cloud security. The primary issue of security arises as the data is outsourced to remote servers and there is less control over the users data. This vulnerability causes data loss and modifications to occur. Some of the major security issues are data integrity verification, deduplication and misbehaviour detection in the cloud storage. To verify the integrity of the data, third party auditing is necessary. Conventional protocols that deal with integrity verification and auditing are not cost effective. Hence there is a need for developing cost-effective auditing protocols for integrity verification of dynamic data. The integrity verification mechanism proposed are cost effective in terms of computation process, communication transaction of messages between the entities and storage data space usage of the Data Owner (DO) to gain trust and security assurance of the data stored. Deduplication is a significant technology used to reduce bandwidth and space by removing redundant data and storing only a unique copy of them. When the data are encrypted by the users random keys producing and the encrypted data could not be matched to identify similarity and discard them from storing it. Hence there is a
Pagination: xviii,124 p.
URI: http://hdl.handle.net/10603/339502
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.48 kBAdobe PDFView/Open
02_certificates.pdf307.02 kBAdobe PDFView/Open
03_vivaproceedings.pdf541.62 kBAdobe PDFView/Open
04_bonafidecertificate.pdf452.3 kBAdobe PDFView/Open
05_abstracts.pdf109.61 kBAdobe PDFView/Open
06_acknowledgements.pdf563.84 kBAdobe PDFView/Open
07_contents.pdf76.38 kBAdobe PDFView/Open
08_listoftables.pdf47.97 kBAdobe PDFView/Open
09_listoffigures.pdf57.53 kBAdobe PDFView/Open
10_listofabbreviations.pdf148.31 kBAdobe PDFView/Open
11_chapter1.pdf425.95 kBAdobe PDFView/Open
12_chapter2.pdf222.76 kBAdobe PDFView/Open
13_chapter3.pdf487.97 kBAdobe PDFView/Open
14_chapter4.pdf496.92 kBAdobe PDFView/Open
15_chapter5.pdf407.19 kBAdobe PDFView/Open
16_chapter6.pdf215.93 kBAdobe PDFView/Open
17_conclusion.pdf89.85 kBAdobe PDFView/Open
18_references.pdf132.64 kBAdobe PDFView/Open
19_listofpublications.pdf79.59 kBAdobe PDFView/Open
80_recommendation.pdf93.98 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: