Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/455774
Title: | Novel authentication and confidentiality schemes for secure mobile communication in cloud |
Researcher: | Milton Ganesh S |
Guide(s): | Manikandan S P |
Keywords: | Mobile Communication Cloud Storage Bigdata Storage |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Every electronic transaction, at present makes use of cloud newlineenvironment for business process and for storage purpose either directly or newlineindirectly. The cloud storage in terms of storage-as-a-service and cloud based newlinebusiness processing as software-as-a-service and platform-as-a-service have newlinebecome indispensable due to its pervasive nature. The applications of cloud newlinestorage range from laymen usage to military contexts. The verification of data newlineintegrity is applicable to numerous situations including grid storage, newlinedistributed storage system, rack servers for Bigdata storage and others. The newlinegenuineness of data integrity is still doubtful due to multitude of security and newlinecompliance issues. Also, certified cloud service professionals are in high newlinedemand and at the same time their expertise in this field is more expected. newlineOne another issue in this line is that, to start a cloud storage service, a newlineprovider has to invest billions of dollars not only for procuring and newlinemaintaining hardware and software resources. But also in cooling equipments, newlineelectrical equipments and skilled, certified personnel to maintain them for newlineproviding uninterrupted cloud service to the customers. Presently, no newlineinternational standards exist to design, implement and maintain the cloud newlinesecurity services such as confidentiality, integrity, authentication, privacy newlineamong other services. Hence, every organization which is involved in this newlinestorage business pertaining to cloud has come up with its own version of newlinesecurity implementations. Moreover, cloud service providers genuinely try to newlineaddress the security issues in which they have expertise but tend to ignore newlineother kind of security issues due to lack of proper understanding at the end newlineuser perspective. Since the cloud based businesses are in billions of dollars, newlinethey try to maintain the customers by providing only a satisfactory service and newlinenot the complete service. newline |
Pagination: | xix,164p. |
URI: | http://hdl.handle.net/10603/455774 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 22.41 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 6.69 MB | Adobe PDF | View/Open | |
03_content.pdf | 100.04 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 161.45 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 389.78 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 340.75 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 384.83 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 651.2 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 625.59 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 578.58 kB | Adobe PDF | View/Open | |
11_annexures.pdf | 128.35 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 125.85 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: