Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/455774
Title: Novel authentication and confidentiality schemes for secure mobile communication in cloud
Researcher: Milton Ganesh S
Guide(s): Manikandan S P
Keywords: Mobile Communication
Cloud Storage
Bigdata Storage
University: Anna University
Completed Date: 2021
Abstract: Every electronic transaction, at present makes use of cloud newlineenvironment for business process and for storage purpose either directly or newlineindirectly. The cloud storage in terms of storage-as-a-service and cloud based newlinebusiness processing as software-as-a-service and platform-as-a-service have newlinebecome indispensable due to its pervasive nature. The applications of cloud newlinestorage range from laymen usage to military contexts. The verification of data newlineintegrity is applicable to numerous situations including grid storage, newlinedistributed storage system, rack servers for Bigdata storage and others. The newlinegenuineness of data integrity is still doubtful due to multitude of security and newlinecompliance issues. Also, certified cloud service professionals are in high newlinedemand and at the same time their expertise in this field is more expected. newlineOne another issue in this line is that, to start a cloud storage service, a newlineprovider has to invest billions of dollars not only for procuring and newlinemaintaining hardware and software resources. But also in cooling equipments, newlineelectrical equipments and skilled, certified personnel to maintain them for newlineproviding uninterrupted cloud service to the customers. Presently, no newlineinternational standards exist to design, implement and maintain the cloud newlinesecurity services such as confidentiality, integrity, authentication, privacy newlineamong other services. Hence, every organization which is involved in this newlinestorage business pertaining to cloud has come up with its own version of newlinesecurity implementations. Moreover, cloud service providers genuinely try to newlineaddress the security issues in which they have expertise but tend to ignore newlineother kind of security issues due to lack of proper understanding at the end newlineuser perspective. Since the cloud based businesses are in billions of dollars, newlinethey try to maintain the customers by providing only a satisfactory service and newlinenot the complete service. newline
Pagination: xix,164p.
URI: http://hdl.handle.net/10603/455774
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.41 kBAdobe PDFView/Open
02_prelim pages.pdf6.69 MBAdobe PDFView/Open
03_content.pdf100.04 kBAdobe PDFView/Open
04_abstract.pdf161.45 kBAdobe PDFView/Open
05_chapter 1.pdf389.78 kBAdobe PDFView/Open
06_chapter 2.pdf340.75 kBAdobe PDFView/Open
07_chapter 3.pdf384.83 kBAdobe PDFView/Open
08_chapter 4.pdf651.2 kBAdobe PDFView/Open
09_chapter 5.pdf625.59 kBAdobe PDFView/Open
10_chapter 6.pdf578.58 kBAdobe PDFView/Open
11_annexures.pdf128.35 kBAdobe PDFView/Open
80_recommendation.pdf125.85 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: