Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/373626
Title: A Method to Enhance Data Storage Security on Cloud Computing Environments
Researcher: Renu S.
Guide(s): S.H. Krishna Veni
Keywords: Computer Science
Computer Science Theory and Methods
Engineering and Technology
University: Noorul Islam Centre for Higher Education
Completed Date: 2021
Abstract: Data Storage Security (DSS) has a vital role in the era of cloud data security. Research and development are growing exponentially in all over the world to ensure data security in the cloud environments. The security risks are countless, so no one can offer complete security by using single technology. Managing security in an efficient way is the only solution to achieve complete security. We have proposed a framework which ensure security even when the storage CSPs or security systems compromises. It is an automated framework providing trusted third party services. The framework is called Binary Tree Security System (BTSS) which integrate some of the security techniques to enable data security. The structure of the framework shows a binary tree structure having a hierarchical relationship with each phase. BTSS have eight different paths which offer different security standards. Data classification, data encryption, and data storage are the three different phases used to ensure security in the BTSS framework. All the security techniques are performed at the user side before data outsourcing. The BTSS framework starts with data classification. We have proposed five different methods to classify unorganized organizational data into four different categories such as sensitive, private, protected and public. Three out of five were manual and the remaining two were automated. A CIA tree concept is used for classification, where a CIA tree is a binary tree where each node represents any one of the key security features such as confidentiality, integrity, and availability. We have found that the automated CIA tree approach is the best method for data classification. newlineThe second phase of BTSS is encryption. We have proposed a novel encryption standard called Tailor Encryption Standard (TES). TES is an application of applied cryptography. An advanced symmetric encryption system using both Fiestel and substitution-permutation structures are the key characteristics of this system. The user can tune the level of security
Pagination: 2158kb
URI: http://hdl.handle.net/10603/373626
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File2.01 MBAdobe PDFView/Open
certificate.pdf419.61 kBAdobe PDFView/Open
chapter1.pdf345.17 kBAdobe PDFView/Open
chapter2.pdf291.79 kBAdobe PDFView/Open
chapter3.pdf919.2 kBAdobe PDFView/Open
chapter4.pdf850.4 kBAdobe PDFView/Open
chapter5.pdf757.28 kBAdobe PDFView/Open
chapter6.pdf602.38 kBAdobe PDFView/Open
chapter7.pdf795.53 kBAdobe PDFView/Open
chapter8.pdf284.51 kBAdobe PDFView/Open
front page.pdf254.82 kBAdobe PDFView/Open
list of publications based on thesis.pdf144.97 kBAdobe PDFView/Open
references.pdf232.41 kBAdobe PDFView/Open
table of contents.pdf17.39 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: