Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/455774
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialNovel authentication and confidentiality schemes for secure mobile communication in cloud
dc.date.accessioned2023-01-31T10:08:43Z-
dc.date.available2023-01-31T10:08:43Z-
dc.identifier.urihttp://hdl.handle.net/10603/455774-
dc.description.abstractEvery electronic transaction, at present makes use of cloud newlineenvironment for business process and for storage purpose either directly or newlineindirectly. The cloud storage in terms of storage-as-a-service and cloud based newlinebusiness processing as software-as-a-service and platform-as-a-service have newlinebecome indispensable due to its pervasive nature. The applications of cloud newlinestorage range from laymen usage to military contexts. The verification of data newlineintegrity is applicable to numerous situations including grid storage, newlinedistributed storage system, rack servers for Bigdata storage and others. The newlinegenuineness of data integrity is still doubtful due to multitude of security and newlinecompliance issues. Also, certified cloud service professionals are in high newlinedemand and at the same time their expertise in this field is more expected. newlineOne another issue in this line is that, to start a cloud storage service, a newlineprovider has to invest billions of dollars not only for procuring and newlinemaintaining hardware and software resources. But also in cooling equipments, newlineelectrical equipments and skilled, certified personnel to maintain them for newlineproviding uninterrupted cloud service to the customers. Presently, no newlineinternational standards exist to design, implement and maintain the cloud newlinesecurity services such as confidentiality, integrity, authentication, privacy newlineamong other services. Hence, every organization which is involved in this newlinestorage business pertaining to cloud has come up with its own version of newlinesecurity implementations. Moreover, cloud service providers genuinely try to newlineaddress the security issues in which they have expertise but tend to ignore newlineother kind of security issues due to lack of proper understanding at the end newlineuser perspective. Since the cloud based businesses are in billions of dollars, newlinethey try to maintain the customers by providing only a satisfactory service and newlinenot the complete service. newline
dc.format.extentxix,164p.
dc.languageEnglish
dc.relationp.154-163
dc.rightsuniversity
dc.titleNovel authentication and confidentiality schemes for secure mobile communication in cloud
dc.title.alternative
dc.creator.researcherMilton Ganesh S
dc.subject.keywordMobile Communication
dc.subject.keywordCloud Storage
dc.subject.keywordBigdata Storage
dc.description.note
dc.contributor.guideManikandan S P
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensions21cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.41 kBAdobe PDFView/Open
02_prelim pages.pdf6.69 MBAdobe PDFView/Open
03_content.pdf100.04 kBAdobe PDFView/Open
04_abstract.pdf161.45 kBAdobe PDFView/Open
05_chapter 1.pdf389.78 kBAdobe PDFView/Open
06_chapter 2.pdf340.75 kBAdobe PDFView/Open
07_chapter 3.pdf384.83 kBAdobe PDFView/Open
08_chapter 4.pdf651.2 kBAdobe PDFView/Open
09_chapter 5.pdf625.59 kBAdobe PDFView/Open
10_chapter 6.pdf578.58 kBAdobe PDFView/Open
11_annexures.pdf128.35 kBAdobe PDFView/Open
80_recommendation.pdf125.85 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: