Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/343891
Title: Enhanced security techniques to protect medical data in cloud based systems
Researcher: Preethi, P
Guide(s): Asokan, R
Keywords: Engineering and Technology
Computer Science
Telecommunications
Cloud computing
Security techniques
Medical data
University: Anna University
Completed Date: 2021
Abstract: Cloud computing is a tremendous service oriented delivery ofmassive computational analysis and information storage over the associatedcommunication channel. It transmits the overwhelming technology thatdrives the internet based technology where the users can seamlessly scatterthe private data for enhanced analysis and extortion. It is clear that the cloudcomputing platforms provides abundant chances for distributed and mutualresources and services along with the data all over the globe. The confidentialcloud over the globe remains within the cloud environment. The prevailingmodels do not provide complete safety for the internet based companieswhich work seamlessly over the cloud environment. User s needs endeavoursin differentiating online businesses where drawbacks are dejected users atcloud environment. To overcome the software attacks while sharing files, thebest way is to create a strong cipher that cannot be broken by thecryptanalysts. The most influential and universal approach to countering thethreats to network / information security is encryption. Even though it is veryauthoritative, the cryptanalysts are very intelligent to break the ciphers. Tomake a stronger cipher it is recommended that to use: More stronger andcomplicated encryption algorithms, keys with more number of bits (Longerkeys), larger block size as input to process, using authentication andconfidentiality mechanism and secure transmission of keys across cloudenvironment. So, cloud users require a secure and efficient method to verifythe integrity and confidentiality of data. The implementation of integritychecking and privacy preserving is considered from three differentapproaches in this investigation. The ultimate objective of modeling thesethree below mentioned models is to provide security more effectually, toattain end-to-end storage and to improve higher processing power in a cloud newlineenvironment. newline newline
Pagination: xxii,154p
URI: http://hdl.handle.net/10603/343891
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File34.08 kBAdobe PDFView/Open
02_certificates.pdf132.37 kBAdobe PDFView/Open
03_vivaproceedings.pdf387.02 kBAdobe PDFView/Open
04_bonafidecertificate.pdf237.89 kBAdobe PDFView/Open
05_abstracts.pdf36.83 kBAdobe PDFView/Open
06_acknowledgements.pdf410.73 kBAdobe PDFView/Open
07_contents.pdf250.57 kBAdobe PDFView/Open
08_listoftables.pdf159.3 kBAdobe PDFView/Open
09_listoffigures.pdf142.66 kBAdobe PDFView/Open
10_listofabbreviations.pdf189.81 kBAdobe PDFView/Open
11_chapter1.pdf223.24 kBAdobe PDFView/Open
12_chapter2.pdf109.06 kBAdobe PDFView/Open
13_chapter3.pdf721.41 kBAdobe PDFView/Open
14_chapter4.pdf862.18 kBAdobe PDFView/Open
15_chapter5.pdf776.98 kBAdobe PDFView/Open
16_chapter6.pdf31.22 kBAdobe PDFView/Open
17_conclusion.pdf31.22 kBAdobe PDFView/Open
18_references.pdf124.89 kBAdobe PDFView/Open
19_listofpublications.pdf24.09 kBAdobe PDFView/Open
80_recommendation.pdf74.39 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: