Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/343485
Title: | Certain investigations onConfidentiality of healthcare information using enhanced data Protection and virtual machineSelection in cloud environment |
Researcher: | Lanitha B |
Guide(s): | Karthik S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems healthcare information virtual machineSelection |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Cloud computing is described as a perfect model for enabling convenient, pervasive, low cost and on-request network admission to configurable distributed computing components like servers, storage devices, networks and service facility that can be provisioned quickly and requires relatively low management effort or the interaction of service providers. Due to its growing demand, cloud computing has completely transformed the communication and information technology industry. The primary goal of the cloud computing is to focus on providing fast, safe and efficient data storing and computing service to the users. The customers of cloud remotely manage data and accomplish excellent services through different cloud applications. The process used for storing cloud information needs to be reliable and private. Unauthorized users can access the data through virtual servers. Hence the protection of cloud computing data is a big problem. The main objective of this exploration work is to investigate and comprehend the safety issues that influence computing performance and to determine proper security systems that are being utilized in the present world of distributed computing.To overcome the data protection problems in cloud computing, the first research work focuses on a new framework and a key generation method called Weighted Mean based Convolutional Neural Network with Advanced Encryption Standard (WMCNN-AES) that encrypts data and retrieves it efficiently. In this method the arbitrarily created keys are given as the input and the finest secret keys are generated. Encryption and decryption are done using Advanced Encryption Standard algorithm to protect the data. For all kinds of queries, this information security model is more productive, viable and more efficient at data confidentiality level. newline |
Pagination: | xx,131p |
URI: | http://hdl.handle.net/10603/343485 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 40 kB | Adobe PDF | View/Open |
02_certificates.pdf | 194.41 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 238.5 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 255.85 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 87.51 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 314.19 kB | Adobe PDF | View/Open | |
07_contents.pdf | 160.38 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 101.47 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 142.92 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 180.87 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 604.26 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 183.78 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 155.43 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 1.4 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 1.16 MB | Adobe PDF | View/Open | |
16_chapter6.pdf | 1.2 MB | Adobe PDF | View/Open | |
17_chapter7.pdf | 318.2 kB | Adobe PDF | View/Open | |
18_conclusion.pdf | 140.68 kB | Adobe PDF | View/Open | |
19_references.pdf | 195.34 kB | Adobe PDF | View/Open | |
20_listofpublications.pdf | 133.08 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 63.94 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: