Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/457961
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-02-14T10:55:54Z-
dc.date.available2023-02-14T10:55:54Z-
dc.identifier.urihttp://hdl.handle.net/10603/457961-
dc.description.abstractnewline The enduring growth of Wireless communication paved the new way to access files newlinein an easy manner by proper authentication between systems. The systems that rely newlineon such communication must be efficient in processing capabilities as well as storage newlinecapacities. The increase in such processing and storage capacities will increase the newlinecost of the system. Hence, cloud based operations have emerged, wherein the newlineapplications that are accessed remotely are deployed on the server. The problem of newlineaccessing the applications by unauthorized users will create a havoc on the systems newlineperformance as these users will be continuously using the resources. Interestingly, newlinehackers also will be using such resources which is unknown to the actual users and newlinefeel the system to be slow in accessing the server. This has motivated the newlinerequirement of cloud secruity to be barred from the use of unauthenticated access. newlineThis thesis mainly concentrates on improving the cloud security by applying double newlineencryption technique and double compression methods such that the performance of newlinethe system can be improved. Initially, compression schemes were implemented such newlinethat files are transmitted from client to server in a faster manner. The use of Huffman newlinecoding has resulted in reduction of file size by 56% and 42% on an average by the newlineuse of arithmetic coding for different file sizes. When bit lengths are kept constant, newlineboth the Huffman and Arithmetic techniques result in equivalent file size reductions newlinefor text files of moderate size. Huffman coding provides a higher level of entropy newlineand coding efficiency than arithmetic coding when dealing with large text files. In newlineterms of encryption time, Huffman has outperformed artithmetic coding. newlineTo improve the efficiency of the system in terms of compression time, encryption newlinetime and encypted size of the file that is being save to the cloud storage, the use of newlineix newlineLZMA is proposed for compressing the file before applying encryption using AES. newlineThe compression ratio is reported to improve by an average of 2-10% depending on newlinethe file type when the proposed framework is used when compared to Huffman. The newlinecompressed file is now encrypted using AES. The encryption keys are further newlineencrypted using RSA, which adds another layer of protection to the data saved in the newlinecloud. The proposed system is simulated using AWS cloud services on a standalone newlinesystem with Linux Mint 19, 4 GB RAM. Different types of media viz., word, text, newlineimage, pdf are considered for experimentations. newlineThe compressed file size is observed to be less, when LZMA compression is used. newlineBut, the problem of compression timing still exist. Hence, to reduce the compression newlinetime on the client side, it is proposed to use Zstandard on the client side to improve newlinethe speed of processing. In comparison to the LZMA-based approach, the Zstandard newlinebased compression scheme achieved compression in 94.78 percent less time. As the newlinefiles are transmitted fast to the server, this prevents unauthorised users from newlineaccessing them. On the server side, the files are decompressed and subsequently newlinecompressed using LZMA. The adoption of LZMA is supported by the fact that the newlinecompressed file size is smaller than that of Zstandard. After compressing the file newlinewith LZMA, it is encrypted using AES and the keys used in AES are further newlineencrypted using RSA. Further, simulations are conducted by processing attacks viz., newlineBrute Force and DDoS on the system that is developed. It is observed that the system newlineis hackproof and the key can be cracked only after 2.32 x 1056 years by scaling the newlinesystem with the supercomputer capabilities. As a result, it can be inferred that the newlinesuggested double compression in conjunction with double encryption results in newlineimproved security.
dc.format.extentp. 125
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleEnhanced security for cloud using dual encryption and compression
dc.title.alternative
dc.creator.researcherSrilakshmi, K
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideBhargavi, P
dc.publisher.placeTirupati
dc.publisher.universitySri Padmavathi Womens University
dc.publisher.institutionDepartment of Computer Science
dc.date.registered2015
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensions35
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
011_chapter 6.pdfAttached File368.02 kBAdobe PDFView/Open
01_title.pdf252.8 kBAdobe PDFView/Open
02_prilimnary.pdf501.86 kBAdobe PDFView/Open
03_contents.pdf74.99 kBAdobe PDFView/Open
04_abstract.pdf65.15 kBAdobe PDFView/Open
05_chapter 1.pdf374.03 kBAdobe PDFView/Open
06_chapter 2.pdf281.87 kBAdobe PDFView/Open
07_chapter 3.pdf558.27 kBAdobe PDFView/Open
08_chapter 4.pdf947.11 kBAdobe PDFView/Open
09_chapter 5.pdf850.03 kBAdobe PDFView/Open
10_annexures.pdf396.13 kBAdobe PDFView/Open
80_recommendation.pdf412.12 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: