Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/384941
Title: Trusted Cloud Service Framework to Secure Cloud Computing
Researcher: Chandrajeet Yadav
Guide(s): B.D.K. Patro
Keywords: Cloud Computing
Computer Science
Computer Science Cybernetics
Engineering and Technology
University: Maharishi University of Information Technology
Completed Date: 2022
Abstract: Numerous adaptive computing resources such as servers, networks storages, and services are newlinepooled to form the cloud computing that helps in offering appropriate and on-demand access newlineto users in the cloud. The vital concern of the cloud framework is the Identity and access newlinemanagement (IAM) for the approval of cloud-based services. Cloud computing is a technique newlinethat is Easily Manageable, wherein the applications that we make use of something such that newlineis issued by an unknown node that would never declare for ownership, which possesses the newlineownership of that application completely. Due to the increase of computer and Mobile users, newlinein all corresponding fields, data storage has become a major concern. Many large and small newlinescale businesses nowadays are growing rapidly towards their data. Furthermore, they are newlinespending a large number of expenses in maintaining the data. By incorporating this method of newlineCloud computing, the user s needs for the hardware and software combinational models are newlineconsiderably minimized. In this thesis, Chapter 1 gives the introduction to cloud computing. newlineIn addition, this section discussed the necessity of cloud computi8ng, merits, and demerits of newlinecloud computing. Next, Chapter 2 presents a review of relevant literature for securing the newlinecommunication between the service provider and service user in a cloud environment from newlinevarious types of attacks. Then, Chapter 3 describes the overall framework of the proposed newlinesystem in this thesis and also provides the mechanism to use group key management newlinetechniques for securing the cloud environment. Then, Chapter 4 discusses a technique of newlineaccess control technique for secured communication in the cloud between the provider and newlinethe user in the cloud. Finally, Chapter 5 provides the conclusion of this work and suggests newlinesome possible future enhancements. newline
Pagination: 
URI: http://hdl.handle.net/10603/384941
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File376.73 kBAdobe PDFView/Open
abstract.pdf391.52 kBAdobe PDFView/Open
acknowledgement.pdf294.76 kBAdobe PDFView/Open
certificate.pdf646.89 kBAdobe PDFView/Open
chapter-1.pdf1.32 MBAdobe PDFView/Open
chapter-2.pdf967.15 kBAdobe PDFView/Open
chapter-3.pdf1.7 MBAdobe PDFView/Open
chapter-4.pdf1.7 MBAdobe PDFView/Open
chapter-5.pdf859.95 kBAdobe PDFView/Open
contents.pdf762.06 kBAdobe PDFView/Open
declaration.pdf649.64 kBAdobe PDFView/Open
list of tables and figures.pdf654.87 kBAdobe PDFView/Open
references and publications.pdf1.21 MBAdobe PDFView/Open
title.pdf598.29 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: