Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/341319
Title: Enhanced secure sharing and optimized privacy preservation of encrypted data stored in cloud
Researcher: R SENTHIL KUMAR
Guide(s): Latha Parthiban
Keywords: Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
University: Vels University
Completed Date: 2019
Abstract: Cloud computing provides best answer to high storage costs of data of companies. Updating of hardware becomes necessary as data generation rate is very high and becomes costly for companies to cope-up with raising storage cost. Maintenance cost becomes less when data storage is outsourced to cloud. Users data is moved to large remotely located data centers, which the user have no control. But cloud gives many security challenges which has to be solved. A new algorithm for checking the data integrity is proposed to check the data correctness of owner. newlineAs growth of electronic personal health records need huge storage, outsourcing it to cloud becomes easy for storage and maintenance. The main concern is the secure sharing and searching of encrypted data along with its privacy preservation. Attribute-based encryption (ABE) technique allows different level of access for different users. Once the file encryption is done, searching is done using the Bloom filter. newlineAs the growth of electronic personal health records needs huge storage, outsourcing it to the cloud becomes easy for storage and maintenance. Complex information in the framework of cloud computing incorporates data from an extensive range of different areas and domains. newlineThere have been excessive efforts to service an extensive range of approaches to improve the privacy of data and to have cloud platforms most secure. Methods that have been used like: anonymization, encryption, homomorphic encryption, trusted platform module, secure multi-party computing and sandboxing. newlineBut, it is still an undeveloped problem about in what way to properly build operational privacy-preserving cloud systems to have the sensitive data securely. newlinevii newlineWe have started with an outline of the main conceptions from cloud computing, followed by categorizing the issues that need to be resolved for secure data management in cloud environments. We then proceed with a depiction of contextual material in addition to reviewing current security and privacy elucidations that are being used in the
Pagination: 
URI: http://hdl.handle.net/10603/341319
Appears in Departments:Computing Sciences

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File103.96 kBAdobe PDFView/Open
02_certificate.pdf18.28 kBAdobe PDFView/Open
03_contents.pdf33.46 kBAdobe PDFView/Open
04_list of figures.pdf105.01 kBAdobe PDFView/Open
05_list of tables.pdf18.34 kBAdobe PDFView/Open
06_acknowledgement.pdf20.97 kBAdobe PDFView/Open
09_chapter 1.pdf355.42 kBAdobe PDFView/Open
10_chapter 2.pdf2.12 MBAdobe PDFView/Open
11_chapter 3.pdf493.64 kBAdobe PDFView/Open
12_chapter 4.pdf575.61 kBAdobe PDFView/Open
13_chapter 5.pdf2.39 MBAdobe PDFView/Open
14_chapter 6.pdf26.07 kBAdobe PDFView/Open
15_references.pdf222.88 kBAdobe PDFView/Open
16_publications.pdf2.16 MBAdobe PDFView/Open
80_recommendation.pdf119.15 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: