Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/444946
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-01-13T06:12:29Z-
dc.date.available2023-01-13T06:12:29Z-
dc.identifier.urihttp://hdl.handle.net/10603/444946-
dc.description.abstractDay-to-day development information security is important in newlineCloud computing has become an influential paradigm in the IT industry. newlineIts main aim is to provide secure, quick, large data storage and good newlineInternet data delivery. The users of the technology expect increasing newlinesecurity and privacy on their data from the cloud service providers. The newlinedifferent level services attain various security breaches due to security newlineleakages. To improve the security based on cryptographic and access newlinecontrol approach. Using these keys can be securely generated, stored, newlineand managed in the cloud to be accessible only by the legitimate newlineorganization and never by the cloud provider. In recent years, modern newlineattacks have grown with Internet technology. So, the service providers newlinehave a great deal of trouble providing security measures for the user newlineinformation and business data. newlineThe issue is keeping up the personality of the client and giving newlineinformation security. The client data can be caught by a problematic newlineclient who can get to the data that is accessible. There are choices in the newlinecloud condition that the characteristic cryptography approach is not in newlinev newlinethe information security. To give such information security, there must newlinebe some encryption principles to improve the security. newlineIn the first approach, The Confidentiality-Preserving Based on newlineAttribute Encryption Using Auditable Access during Encrypted Records newlinein the Cloud environment improves cloud security. The proposed newlinePrivacy preserving-characteristic encryption is integrated into the newlinecryptographic approach. Initially, access control is verified to allow the newlineuser into the cloud account. This creates the access role-based Attributebased newlineencryption (ABE) in the cryptographic approach.This verifies the newlineKey management level security provided they read access to control the newlineusers. The keys are randomly generated to access the control to the newlineauthenticated user. The ABE essential key management hierarchy for newlinebetter security by verifying the auditability resource with privacypreserving newline
dc.format.extentA5, VI, 150
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleA novel charecteristic Structure arrangement of user log based Privacy preserving during auditing time in Cloud environment
dc.title.alternative
dc.creator.researcherRaja J
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Interdisciplinary Applications
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideRamakrishnan M
dc.publisher.placeChennai
dc.publisher.universitySathyabama Institute of Science and Technology
dc.publisher.institutionCOMPUTER SCIENCE DEPARTMENT
dc.date.registered2012
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensionsA5
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
10.annextures.pdfAttached File1.31 MBAdobe PDFView/Open
1.title.pdf237.08 kBAdobe PDFView/Open
2.prelim pages.pdf5.3 MBAdobe PDFView/Open
3.abstract.pdf19.76 kBAdobe PDFView/Open
4.contents.pdf124.73 kBAdobe PDFView/Open
5.chapter 1.pdf390 kBAdobe PDFView/Open
6.chapter 2.pdf209.26 kBAdobe PDFView/Open
7.chapter 3.pdf564.63 kBAdobe PDFView/Open
80_recommendation.pdf237.08 kBAdobe PDFView/Open
8.chapter 4.pdf541.26 kBAdobe PDFView/Open
9.chapter 5.pdf684.85 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: