Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/368948
Title: A Novel Approach for Data Security and Privacy In Cloud Computing
Researcher: G. Venifa Mini
Guide(s): K.S. Angel Viji
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Noorul Islam Centre for Higher Education
Completed Date: 2021
Abstract: Cloud is a collective term for a wide range of developments and opportunities. It is more of a practical innovation than an invention. Communication is the most significant gift that the internet has given to the common man. The internet is very essential because it is the limitless space where infinite quantities of data are available to individuals. The ease of use along with the ever-increasing number of customers entering the internet environment on a regular basis has converted the use of internet facilities into a compulsory daily activity rather than an optional interaction like it was in its early phases. This tremendous growth has encouraged many professionals and IT experts to invest in creating more innovative web services that will attract more and more customers to enhance the quality of life in both the physical and online worlds. newlineWith resource virtualization, the cloud can provide on-demand self-service, rapid resource elasticity and usage-based pricing, which thus make cloud services as convenient as the daily-life utilities such as electricity, water, and gas. This demand of reducing the computing cost has led to the innovation of cloud computing. Cloud computing provide better computing through improved utilization, reduced administration and infrastructure costs. The data sharing capabilities benefit the user through greater productivity and eand#64259;ciency. newlineIn spite of its widely recognized economic benefits, cloud computing removes customers direct control over the systems that manage their data, which raises significant security and privacy concerns and is one of the major barriers to its adoption. However, the cloud is susceptible to security and privacy vulnerabilities such as key management, loss of control and privacy. Sensitive information housed under the security domain of user has now been placed under the protection of service provider. Health record is the typical example of sensitive information. Access policies encourage researchers to spread widely such data in a de-identified form
Pagination: 2698Kb
URI: http://hdl.handle.net/10603/368948
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File330.62 kBAdobe PDFView/Open
bonafide.pdf551.18 kBAdobe PDFView/Open
chapter1.pdf521.63 kBAdobe PDFView/Open
chapter2.pdf346.44 kBAdobe PDFView/Open
chapter3.pdf337.46 kBAdobe PDFView/Open
chapter4.pdf1.85 MBAdobe PDFView/Open
chapter5.pdf701.97 kBAdobe PDFView/Open
chapter6.pdf762.62 kBAdobe PDFView/Open
chapter7.pdf115.36 kBAdobe PDFView/Open
front page.pdf328.83 kBAdobe PDFView/Open
list of publications based on thesis.pdf57.99 kBAdobe PDFView/Open
references.pdf108.57 kBAdobe PDFView/Open
table of contents.pdf271.03 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: