Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/351928
Title: Improving The Data Integrity In Cloud Environment By Using Third Party Auditor
Researcher: Raja Shree,S
Guide(s): Chilambu Chelvan,A
Keywords: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2021
Abstract: Cloud Computing, an emerging technology shows an extensive growth in IT field, business industries, education sectors etc., It provides better flexibility in usage of data as well as reduce the maintenance of infrastructure. A striking feature of cloud computing was found to be in the adoption of IT services without any direct investment. Based on the demand, the users can access the shared lash of configurable computing devices provided by cloud. newline newlineFlexibility available in the cloud servers introduced certain risks in the trust and confidentiality of the stored data. When the whole world trusts this technology, it is necessary to assure that data being stored on cloud is secure and do not allow others to tamper the information when unknown parties present already. newline newlineDue to data sharing and data storing, security plays a vital role in cloud and it is therefore a major challenge to its users. Various security issues such as privacy, integrity and confirmation are running behind the massive cloud technology. Among these, data integrity play a substantial role in the cloud computing and various techniques were proposed to check the integrity of the data in cloud storage. newline newline newline newline newline newline newlineData integrity was found to be an inevitable issue in cloud computing and are generally defined by the accuracy and consistency of data stored. Traditionally, the data integrity was verified by the comparison of extracted data from the server with the correctness by hash values of the entire file. A third party entity authentication is needed to check for integrity of cloud data and inform the user about data corruptions or loss. However, the significant challenges in the extraction of the whole data were concerned with the cost, increase in the communication resources and the data to be updated or deleted. newline newlineSecurity of the data stored in remote servers purely based on private key which is used in cryptographic functions for preserving the data. In this research Cuckoo search optimization technique is employed to optimize the secret
Pagination: A5
URI: http://hdl.handle.net/10603/351928
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
01. title.pdfAttached File141.05 kBAdobe PDFView/Open
02. certificate.pdf613.36 kBAdobe PDFView/Open
03. acknowledgement.pdf137.59 kBAdobe PDFView/Open
04. abstract.pdf269.11 kBAdobe PDFView/Open
05. table of contents.pdf1.01 MBAdobe PDFView/Open
06. chapter 1.pdf3.05 MBAdobe PDFView/Open
06. chapter 2.pdf1.83 MBAdobe PDFView/Open
06. chapter 3.pdf1.48 MBAdobe PDFView/Open
06. chapter 4.pdf1.35 MBAdobe PDFView/Open
06. chapter 5.pdf1.61 MBAdobe PDFView/Open
06. chapter 6.pdf1.9 MBAdobe PDFView/Open
06. chapter 7.pdf1.76 MBAdobe PDFView/Open
06. chapter 8.pdf1.4 MBAdobe PDFView/Open
07. conclusion.pdf204.21 kBAdobe PDFView/Open
08. references.pdf1.69 MBAdobe PDFView/Open
09. curriculam vitae.pdf134.62 kBAdobe PDFView/Open
10. evaluation reports.pdf2.44 MBAdobe PDFView/Open
80_recommendation.pdf141.05 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: