Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/343485
Title: Certain investigations onConfidentiality of healthcare information using enhanced data Protection and virtual machineSelection in cloud environment
Researcher: Lanitha B
Guide(s): Karthik S
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
healthcare information
virtual machineSelection
University: Anna University
Completed Date: 2021
Abstract: Cloud computing is described as a perfect model for enabling convenient, pervasive, low cost and on-request network admission to configurable distributed computing components like servers, storage devices, networks and service facility that can be provisioned quickly and requires relatively low management effort or the interaction of service providers. Due to its growing demand, cloud computing has completely transformed the communication and information technology industry. The primary goal of the cloud computing is to focus on providing fast, safe and efficient data storing and computing service to the users. The customers of cloud remotely manage data and accomplish excellent services through different cloud applications. The process used for storing cloud information needs to be reliable and private. Unauthorized users can access the data through virtual servers. Hence the protection of cloud computing data is a big problem. The main objective of this exploration work is to investigate and comprehend the safety issues that influence computing performance and to determine proper security systems that are being utilized in the present world of distributed computing.To overcome the data protection problems in cloud computing, the first research work focuses on a new framework and a key generation method called Weighted Mean based Convolutional Neural Network with Advanced Encryption Standard (WMCNN-AES) that encrypts data and retrieves it efficiently. In this method the arbitrarily created keys are given as the input and the finest secret keys are generated. Encryption and decryption are done using Advanced Encryption Standard algorithm to protect the data. For all kinds of queries, this information security model is more productive, viable and more efficient at data confidentiality level. newline
Pagination: xx,131p
URI: http://hdl.handle.net/10603/343485
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File40 kBAdobe PDFView/Open
02_certificates.pdf194.41 kBAdobe PDFView/Open
03_vivaproceedings.pdf238.5 kBAdobe PDFView/Open
04_bonafidecertificate.pdf255.85 kBAdobe PDFView/Open
05_abstracts.pdf87.51 kBAdobe PDFView/Open
06_acknowledgements.pdf314.19 kBAdobe PDFView/Open
07_contents.pdf160.38 kBAdobe PDFView/Open
08_listoftables.pdf101.47 kBAdobe PDFView/Open
09_listoffigures.pdf142.92 kBAdobe PDFView/Open
10_listofabbreviations.pdf180.87 kBAdobe PDFView/Open
11_chapter1.pdf604.26 kBAdobe PDFView/Open
12_chapter2.pdf183.78 kBAdobe PDFView/Open
13_chapter3.pdf155.43 kBAdobe PDFView/Open
14_chapter4.pdf1.4 MBAdobe PDFView/Open
15_chapter5.pdf1.16 MBAdobe PDFView/Open
16_chapter6.pdf1.2 MBAdobe PDFView/Open
17_chapter7.pdf318.2 kBAdobe PDFView/Open
18_conclusion.pdf140.68 kBAdobe PDFView/Open
19_references.pdf195.34 kBAdobe PDFView/Open
20_listofpublications.pdf133.08 kBAdobe PDFView/Open
80_recommendation.pdf63.94 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: