Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/384941
Title: | Trusted Cloud Service Framework to Secure Cloud Computing |
Researcher: | Chandrajeet Yadav |
Guide(s): | B.D.K. Patro |
Keywords: | Cloud Computing Computer Science Computer Science Cybernetics Engineering and Technology |
University: | Maharishi University of Information Technology |
Completed Date: | 2022 |
Abstract: | Numerous adaptive computing resources such as servers, networks storages, and services are newlinepooled to form the cloud computing that helps in offering appropriate and on-demand access newlineto users in the cloud. The vital concern of the cloud framework is the Identity and access newlinemanagement (IAM) for the approval of cloud-based services. Cloud computing is a technique newlinethat is Easily Manageable, wherein the applications that we make use of something such that newlineis issued by an unknown node that would never declare for ownership, which possesses the newlineownership of that application completely. Due to the increase of computer and Mobile users, newlinein all corresponding fields, data storage has become a major concern. Many large and small newlinescale businesses nowadays are growing rapidly towards their data. Furthermore, they are newlinespending a large number of expenses in maintaining the data. By incorporating this method of newlineCloud computing, the user s needs for the hardware and software combinational models are newlineconsiderably minimized. In this thesis, Chapter 1 gives the introduction to cloud computing. newlineIn addition, this section discussed the necessity of cloud computi8ng, merits, and demerits of newlinecloud computing. Next, Chapter 2 presents a review of relevant literature for securing the newlinecommunication between the service provider and service user in a cloud environment from newlinevarious types of attacks. Then, Chapter 3 describes the overall framework of the proposed newlinesystem in this thesis and also provides the mechanism to use group key management newlinetechniques for securing the cloud environment. Then, Chapter 4 discusses a technique of newlineaccess control technique for secured communication in the cloud between the provider and newlinethe user in the cloud. Finally, Chapter 5 provides the conclusion of this work and suggests newlinesome possible future enhancements. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/384941 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 376.73 kB | Adobe PDF | View/Open |
abstract.pdf | 391.52 kB | Adobe PDF | View/Open | |
acknowledgement.pdf | 294.76 kB | Adobe PDF | View/Open | |
certificate.pdf | 646.89 kB | Adobe PDF | View/Open | |
chapter-1.pdf | 1.32 MB | Adobe PDF | View/Open | |
chapter-2.pdf | 967.15 kB | Adobe PDF | View/Open | |
chapter-3.pdf | 1.7 MB | Adobe PDF | View/Open | |
chapter-4.pdf | 1.7 MB | Adobe PDF | View/Open | |
chapter-5.pdf | 859.95 kB | Adobe PDF | View/Open | |
contents.pdf | 762.06 kB | Adobe PDF | View/Open | |
declaration.pdf | 649.64 kB | Adobe PDF | View/Open | |
list of tables and figures.pdf | 654.87 kB | Adobe PDF | View/Open | |
references and publications.pdf | 1.21 MB | Adobe PDF | View/Open | |
title.pdf | 598.29 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: