Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/373626
Title: | A Method to Enhance Data Storage Security on Cloud Computing Environments |
Researcher: | Renu S. |
Guide(s): | S.H. Krishna Veni |
Keywords: | Computer Science Computer Science Theory and Methods Engineering and Technology |
University: | Noorul Islam Centre for Higher Education |
Completed Date: | 2021 |
Abstract: | Data Storage Security (DSS) has a vital role in the era of cloud data security. Research and development are growing exponentially in all over the world to ensure data security in the cloud environments. The security risks are countless, so no one can offer complete security by using single technology. Managing security in an efficient way is the only solution to achieve complete security. We have proposed a framework which ensure security even when the storage CSPs or security systems compromises. It is an automated framework providing trusted third party services. The framework is called Binary Tree Security System (BTSS) which integrate some of the security techniques to enable data security. The structure of the framework shows a binary tree structure having a hierarchical relationship with each phase. BTSS have eight different paths which offer different security standards. Data classification, data encryption, and data storage are the three different phases used to ensure security in the BTSS framework. All the security techniques are performed at the user side before data outsourcing. The BTSS framework starts with data classification. We have proposed five different methods to classify unorganized organizational data into four different categories such as sensitive, private, protected and public. Three out of five were manual and the remaining two were automated. A CIA tree concept is used for classification, where a CIA tree is a binary tree where each node represents any one of the key security features such as confidentiality, integrity, and availability. We have found that the automated CIA tree approach is the best method for data classification. newlineThe second phase of BTSS is encryption. We have proposed a novel encryption standard called Tailor Encryption Standard (TES). TES is an application of applied cryptography. An advanced symmetric encryption system using both Fiestel and substitution-permutation structures are the key characteristics of this system. The user can tune the level of security |
Pagination: | 2158kb |
URI: | http://hdl.handle.net/10603/373626 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 2.01 MB | Adobe PDF | View/Open |
certificate.pdf | 419.61 kB | Adobe PDF | View/Open | |
chapter1.pdf | 345.17 kB | Adobe PDF | View/Open | |
chapter2.pdf | 291.79 kB | Adobe PDF | View/Open | |
chapter3.pdf | 919.2 kB | Adobe PDF | View/Open | |
chapter4.pdf | 850.4 kB | Adobe PDF | View/Open | |
chapter5.pdf | 757.28 kB | Adobe PDF | View/Open | |
chapter6.pdf | 602.38 kB | Adobe PDF | View/Open | |
chapter7.pdf | 795.53 kB | Adobe PDF | View/Open | |
chapter8.pdf | 284.51 kB | Adobe PDF | View/Open | |
front page.pdf | 254.82 kB | Adobe PDF | View/Open | |
list of publications based on thesis.pdf | 144.97 kB | Adobe PDF | View/Open | |
references.pdf | 232.41 kB | Adobe PDF | View/Open | |
table of contents.pdf | 17.39 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: