Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/346492
Title: | Preserving Privacy For Data Integrity And Storage Security In Cloud Using Efficient Techniques |
Researcher: | Santhosh Kumar,P |
Guide(s): | Latha Parthiban |
Keywords: | Computer Science Computer Science Artificial Intelligence Engineering and Technology |
University: | Sathyabama Institute of Science and Technology |
Completed Date: | 2020 |
Abstract: | ABSTRACT newline newlineThe term cloud computing is an emerging platform which entertains the users to store the data remotely. The major issues in the cloud computing which are challenging factor for the cloud users are data privacy and its security. The existing methods of cloud platform lack with the security features and also lacks with the security for the attacks raised in the cloud environment. The other problems faced by the existing schemes are scheduling and data integrity. Further the efficacy of various methods with the existing technical auditing has to be improved. But it results in the traceability problems and data in freshness while preserving privacy. newlineIn this research several security algorithms, scheduling algorithms and data integrity techniques were analyzed and novel algorithm is proposed. The entire work is split into to four phases (i) Security enhancement, (ii) Data Integrity (iii) Scheduling Process and (iv) Data Partitioning and Anomaly detection. To improve the data privacy a new scheme has been approached. newlineIn the first phase, a method operating over dynamic data is proposed which uses Cloud Data Integrity Auditing over Dynamic Data Multiple Users (CDIA-DDMU) approach to overcome the collusion attacks and the newline newline newline newline newline newlinedata auditing mechanism is achieved by means of vector commitment and backward unlinkable verifier local abrogation group signature. This proposed approach permits multiple users to handle remote cloud data. Hence, quality of service and tightened security is ensured in this research work with reasonable update time and a strict verification policy correspondingly. newlineThe second phase is data scheduling and this is done by using first come first serve (FCFS) which improves system efficiency and makes the system to perform the process in parallel manner. Moreover Crisscross Advanced Encryption Standard (CAES) is used to enhance security. In this approach, crisscross AES has been implemented which provides more security to the cloud via grid. This proposed approach e |
Pagination: | A5 |
URI: | http://hdl.handle.net/10603/346492 |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10. chapter 5.pdf | Attached File | 1.44 MB | Adobe PDF | View/Open |
11. chapter 6.pdf | 1.46 MB | Adobe PDF | View/Open | |
12. conclusion.pdf | 455.47 kB | Adobe PDF | View/Open | |
13. references.pdf | 246.44 kB | Adobe PDF | View/Open | |
14. curriculam vitae.pdf | 86.5 kB | Adobe PDF | View/Open | |
15. evaluation reports.pdf | 844.93 kB | Adobe PDF | View/Open | |
1. title.pdf | 96.26 kB | Adobe PDF | View/Open | |
2. certificate.pdf | 778.73 kB | Adobe PDF | View/Open | |
3. acknolwledgement.pdf | 135.35 kB | Adobe PDF | View/Open | |
4. abstract.pdf | 167.19 kB | Adobe PDF | View/Open | |
5. table of contents.pdf | 735.94 kB | Adobe PDF | View/Open | |
6. chapter 1.pdf | 508.78 kB | Adobe PDF | View/Open | |
7. chapter 2.pdf | 306.36 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 96.26 kB | Adobe PDF | View/Open | |
8. chapter 3.pdf | 633.99 kB | Adobe PDF | View/Open | |
9. chapter 4.pdf | 708.68 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: