Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/454433
Title: A novel charecteristic Structure arrangement of user log based Privacy preserving during auditing time in Cloud environment
Researcher: Raja J
Guide(s): Ramakrishnan M
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2021
Abstract: Day-to-day development information security is important in newlineCloud computing has become an influential paradigm in the IT industry. newlineIts main aim is to provide secure, quick, large data storage and good newlineInternet data delivery. The users of the technology expect increasing newlinesecurity and privacy on their data from the cloud service providers. The newlinedifferent level services attain various security breaches due to security newlineleakages. To improve the security based on cryptographic and access newlinecontrol approach. Using these keys can be securely generated, stored, newlineand managed in the cloud to be accessible only by the legitimate newlineorganization and never by the cloud provider. In recent years, modern newlineattacks have grown with Internet technology. So, the service providers newlinehave a great deal of trouble providing security measures for the user newlineinformation and business data. newlineThe issue is keeping up the personality of the client and giving newlineinformation security. The client data can be caught by a problematic newlineclient who can get to the data that is accessible. There are choices in the newlinecloud condition that the characteristic cryptography approach is not in newlinev newlinethe information security. To give such information security, there must newlinebe some encryption principles to improve the security. newlineIn the first approach, The Confidentiality-Preserving Based on newlineAttribute Encryption Using Auditable Access during Encrypted Records newlinein the Cloud environment improves cloud security. The proposed newlinePrivacy preserving-characteristic encryption is integrated into the newlinecryptographic approach. Initially, access control is verified to allow the newlineuser into the cloud account. This creates the access role-based Attributebased newlineencryption (ABE) in the cryptographic approach.This verifies the newlineKey management level security provided they read access to control the newlineusers. The keys are randomly generated to access the control to the newlineauthenticated user. The ABE essential key management hierarchy for newlinebetter security by verifying the auditability resource with privacypreserving newline
Pagination: A5, III, 150
URI: http://hdl.handle.net/10603/454433
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
10.annextures.pdfAttached File1.31 MBAdobe PDFView/Open
1.title.pdf237.08 kBAdobe PDFView/Open
2.prelim pages.pdf5.3 MBAdobe PDFView/Open
3.abstract.pdf19.76 kBAdobe PDFView/Open
4.contents.pdf124.73 kBAdobe PDFView/Open
5.chapter 1.pdf390 kBAdobe PDFView/Open
6.chapter 2.pdf209.26 kBAdobe PDFView/Open
7.chapter 3.pdf564.63 kBAdobe PDFView/Open
80_recommendation.pdf237.08 kBAdobe PDFView/Open
8.chapter 4.pdf541.26 kBAdobe PDFView/Open
9.chapter 5.pdf684.85 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: