Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/346492
Title: Preserving Privacy For Data Integrity And Storage Security In Cloud Using Efficient Techniques
Researcher: Santhosh Kumar,P
Guide(s): Latha Parthiban
Keywords: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2020
Abstract: ABSTRACT newline newlineThe term cloud computing is an emerging platform which entertains the users to store the data remotely. The major issues in the cloud computing which are challenging factor for the cloud users are data privacy and its security. The existing methods of cloud platform lack with the security features and also lacks with the security for the attacks raised in the cloud environment. The other problems faced by the existing schemes are scheduling and data integrity. Further the efficacy of various methods with the existing technical auditing has to be improved. But it results in the traceability problems and data in freshness while preserving privacy. newlineIn this research several security algorithms, scheduling algorithms and data integrity techniques were analyzed and novel algorithm is proposed. The entire work is split into to four phases (i) Security enhancement, (ii) Data Integrity (iii) Scheduling Process and (iv) Data Partitioning and Anomaly detection. To improve the data privacy a new scheme has been approached. newlineIn the first phase, a method operating over dynamic data is proposed which uses Cloud Data Integrity Auditing over Dynamic Data Multiple Users (CDIA-DDMU) approach to overcome the collusion attacks and the newline newline newline newline newline newlinedata auditing mechanism is achieved by means of vector commitment and backward unlinkable verifier local abrogation group signature. This proposed approach permits multiple users to handle remote cloud data. Hence, quality of service and tightened security is ensured in this research work with reasonable update time and a strict verification policy correspondingly. newlineThe second phase is data scheduling and this is done by using first come first serve (FCFS) which improves system efficiency and makes the system to perform the process in parallel manner. Moreover Crisscross Advanced Encryption Standard (CAES) is used to enhance security. In this approach, crisscross AES has been implemented which provides more security to the cloud via grid. This proposed approach e
Pagination: A5
URI: http://hdl.handle.net/10603/346492
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
10. chapter 5.pdfAttached File1.44 MBAdobe PDFView/Open
11. chapter 6.pdf1.46 MBAdobe PDFView/Open
12. conclusion.pdf455.47 kBAdobe PDFView/Open
13. references.pdf246.44 kBAdobe PDFView/Open
14. curriculam vitae.pdf86.5 kBAdobe PDFView/Open
15. evaluation reports.pdf844.93 kBAdobe PDFView/Open
1. title.pdf96.26 kBAdobe PDFView/Open
2. certificate.pdf778.73 kBAdobe PDFView/Open
3. acknolwledgement.pdf135.35 kBAdobe PDFView/Open
4. abstract.pdf167.19 kBAdobe PDFView/Open
5. table of contents.pdf735.94 kBAdobe PDFView/Open
6. chapter 1.pdf508.78 kBAdobe PDFView/Open
7. chapter 2.pdf306.36 kBAdobe PDFView/Open
80_recommendation.pdf96.26 kBAdobe PDFView/Open
8. chapter 3.pdf633.99 kBAdobe PDFView/Open
9. chapter 4.pdf708.68 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: