Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/470256
Title: Public Auditing Technique for Securing Privacy in Cloud Storage Using Modified Elliptic Curve Diffie Hellmann Algorithm
Researcher: Nagesh, O. Sri
Guide(s): Kumar, Tapas
Keywords: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
University: Lingayas University
Completed Date: 2018
Abstract: In the cloud environment, cloud storage is considered to be an essential service in present days. newlineSince users can store personal data online and can be able to retrieve the data or remotely store newlineand manage via the internet. Authentication and authorization must be provided perfectly as newlineillegal users may reveal the Information of data stored and the symmetric key information used by newlinethe users. The users may use PC s, Mobile devices or laptops for sending the data to the cloud newlinestore. If illegal user gets permission may disclose sensitive data it is to be prevented. The cloud newlineusers may store their sensitive data and also stores the public/private keys in the cloud servers for newlineaccessing data in future. These data and public/private keys must be preserved carefully. newlineWhenever user requests data first user has to get their public/private key from servers. Then with newlinethe help of these keys they access the data which are in encrypted form will be decrypted with newlinehelp of these keys. Long standing data or keys are sensitive to brute force attacks and any other newlineattacks. So Cloud Server has to take care of these issues. There is a responsibility of Cloud newlineServers to attain all these issues. This is a challenging issue for the cloud servers. This is the newlineresponsibility of Cloud Servers to create trust on them in-order to increase the cloud users. Cloud newlinestorage point access to the user or data storage point access in the cloud server to the user is to be newlinerestricted with some conditions. By this, the privacy and security matters using the cloud newlineenvironment are being important and typical due to the elastic, scalable, and virtualized nature of newlinecloud resources. newline
Pagination: 
URI: http://hdl.handle.net/10603/470256
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File167.45 kBAdobe PDFView/Open
02_prelim pages.pdf185.64 kBAdobe PDFView/Open
03_content.pdf261.75 kBAdobe PDFView/Open
04_abstract.pdf88.66 kBAdobe PDFView/Open
05_chapter 1.pdf495.01 kBAdobe PDFView/Open
06_chapter 2.pdf1.21 MBAdobe PDFView/Open
07_chapter 3.pdf403.97 kBAdobe PDFView/Open
08_chapter 4.pdf509.91 kBAdobe PDFView/Open
09_chapter 5.pdf515.07 kBAdobe PDFView/Open
10_chapter 6.pdf350.74 kBAdobe PDFView/Open
11_annexures.pdf306.32 kBAdobe PDFView/Open
80_recommendation.pdf414.84 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: