Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/454433
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2023-01-30T06:33:06Z | - |
dc.date.available | 2023-01-30T06:33:06Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/454433 | - |
dc.description.abstract | Day-to-day development information security is important in newlineCloud computing has become an influential paradigm in the IT industry. newlineIts main aim is to provide secure, quick, large data storage and good newlineInternet data delivery. The users of the technology expect increasing newlinesecurity and privacy on their data from the cloud service providers. The newlinedifferent level services attain various security breaches due to security newlineleakages. To improve the security based on cryptographic and access newlinecontrol approach. Using these keys can be securely generated, stored, newlineand managed in the cloud to be accessible only by the legitimate newlineorganization and never by the cloud provider. In recent years, modern newlineattacks have grown with Internet technology. So, the service providers newlinehave a great deal of trouble providing security measures for the user newlineinformation and business data. newlineThe issue is keeping up the personality of the client and giving newlineinformation security. The client data can be caught by a problematic newlineclient who can get to the data that is accessible. There are choices in the newlinecloud condition that the characteristic cryptography approach is not in newlinev newlinethe information security. To give such information security, there must newlinebe some encryption principles to improve the security. newlineIn the first approach, The Confidentiality-Preserving Based on newlineAttribute Encryption Using Auditable Access during Encrypted Records newlinein the Cloud environment improves cloud security. The proposed newlinePrivacy preserving-characteristic encryption is integrated into the newlinecryptographic approach. Initially, access control is verified to allow the newlineuser into the cloud account. This creates the access role-based Attributebased newlineencryption (ABE) in the cryptographic approach.This verifies the newlineKey management level security provided they read access to control the newlineusers. The keys are randomly generated to access the control to the newlineauthenticated user. The ABE essential key management hierarchy for newlinebetter security by verifying the auditability resource with privacypreserving newline | |
dc.format.extent | A5, III, 150 | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | A novel charecteristic Structure arrangement of user log based Privacy preserving during auditing time in Cloud environment | |
dc.title.alternative | ||
dc.creator.researcher | Raja J | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Information Systems | |
dc.subject.keyword | Engineering and Technology | |
dc.description.note | ||
dc.contributor.guide | Ramakrishnan M | |
dc.publisher.place | Chennai | |
dc.publisher.university | Sathyabama Institute of Science and Technology | |
dc.publisher.institution | COMPUTER SCIENCE DEPARTMENT | |
dc.date.registered | 2012 | |
dc.date.completed | 2021 | |
dc.date.awarded | 2022 | |
dc.format.dimensions | A5 | |
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10.annextures.pdf | Attached File | 1.31 MB | Adobe PDF | View/Open |
1.title.pdf | 237.08 kB | Adobe PDF | View/Open | |
2.prelim pages.pdf | 5.3 MB | Adobe PDF | View/Open | |
3.abstract.pdf | 19.76 kB | Adobe PDF | View/Open | |
4.contents.pdf | 124.73 kB | Adobe PDF | View/Open | |
5.chapter 1.pdf | 390 kB | Adobe PDF | View/Open | |
6.chapter 2.pdf | 209.26 kB | Adobe PDF | View/Open | |
7.chapter 3.pdf | 564.63 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 237.08 kB | Adobe PDF | View/Open | |
8.chapter 4.pdf | 541.26 kB | Adobe PDF | View/Open | |
9.chapter 5.pdf | 684.85 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: