Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/339502
Title: | Enhanced security approach for outsourced data auditing in cloud storage |
Researcher: | Esther Daniel |
Guide(s): | Vasanthi, N A |
Keywords: | Cloud storage Data auditing Security |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Cloud Storage prevails over the entire world and makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Data storage is an essential aspect in this era where the data growth is exponential. Enormous sensitive data is stored into the cloud. The dynamic data refers to information that is asynchronously changed as further updates to the information becomes available. There is no assurance that the data outsourced on remote storage servers are safe and not been lost or modified. As the user s data are stored and maintained out of user s premises, these services create concerns of security vulnerabilities for all the services provided by them. Extensive research is carried out to solve the issues with the service providers and cloud security. The primary issue of security arises as the data is outsourced to remote servers and there is less control over the users data. This vulnerability causes data loss and modifications to occur. Some of the major security issues are data integrity verification, deduplication and misbehaviour detection in the cloud storage. To verify the integrity of the data, third party auditing is necessary. Conventional protocols that deal with integrity verification and auditing are not cost effective. Hence there is a need for developing cost-effective auditing protocols for integrity verification of dynamic data. The integrity verification mechanism proposed are cost effective in terms of computation process, communication transaction of messages between the entities and storage data space usage of the Data Owner (DO) to gain trust and security assurance of the data stored. Deduplication is a significant technology used to reduce bandwidth and space by removing redundant data and storing only a unique copy of them. When the data are encrypted by the users random keys producing and the encrypted data could not be matched to identify similarity and discard them from storing it. Hence there is a |
Pagination: | xviii,124 p. |
URI: | http://hdl.handle.net/10603/339502 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 22.48 kB | Adobe PDF | View/Open |
02_certificates.pdf | 307.02 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 541.62 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 452.3 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 109.61 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 563.84 kB | Adobe PDF | View/Open | |
07_contents.pdf | 76.38 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 47.97 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 57.53 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 148.31 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 425.95 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 222.76 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 487.97 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 496.92 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 407.19 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 215.93 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 89.85 kB | Adobe PDF | View/Open | |
18_references.pdf | 132.64 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 79.59 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 93.98 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: