Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/343891
Title: | Enhanced security techniques to protect medical data in cloud based systems |
Researcher: | Preethi, P |
Guide(s): | Asokan, R |
Keywords: | Engineering and Technology Computer Science Telecommunications Cloud computing Security techniques Medical data |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Cloud computing is a tremendous service oriented delivery ofmassive computational analysis and information storage over the associatedcommunication channel. It transmits the overwhelming technology thatdrives the internet based technology where the users can seamlessly scatterthe private data for enhanced analysis and extortion. It is clear that the cloudcomputing platforms provides abundant chances for distributed and mutualresources and services along with the data all over the globe. The confidentialcloud over the globe remains within the cloud environment. The prevailingmodels do not provide complete safety for the internet based companieswhich work seamlessly over the cloud environment. User s needs endeavoursin differentiating online businesses where drawbacks are dejected users atcloud environment. To overcome the software attacks while sharing files, thebest way is to create a strong cipher that cannot be broken by thecryptanalysts. The most influential and universal approach to countering thethreats to network / information security is encryption. Even though it is veryauthoritative, the cryptanalysts are very intelligent to break the ciphers. Tomake a stronger cipher it is recommended that to use: More stronger andcomplicated encryption algorithms, keys with more number of bits (Longerkeys), larger block size as input to process, using authentication andconfidentiality mechanism and secure transmission of keys across cloudenvironment. So, cloud users require a secure and efficient method to verifythe integrity and confidentiality of data. The implementation of integritychecking and privacy preserving is considered from three differentapproaches in this investigation. The ultimate objective of modeling thesethree below mentioned models is to provide security more effectually, toattain end-to-end storage and to improve higher processing power in a cloud newlineenvironment. newline newline |
Pagination: | xxii,154p |
URI: | http://hdl.handle.net/10603/343891 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 34.08 kB | Adobe PDF | View/Open |
02_certificates.pdf | 132.37 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 387.02 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 237.89 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 36.83 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 410.73 kB | Adobe PDF | View/Open | |
07_contents.pdf | 250.57 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 159.3 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 142.66 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 189.81 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 223.24 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 109.06 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 721.41 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 862.18 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 776.98 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 31.22 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 31.22 kB | Adobe PDF | View/Open | |
18_references.pdf | 124.89 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 24.09 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 74.39 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: