Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/470256
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-03-16T10:06:00Z-
dc.date.available2023-03-16T10:06:00Z-
dc.identifier.urihttp://hdl.handle.net/10603/470256-
dc.description.abstractIn the cloud environment, cloud storage is considered to be an essential service in present days. newlineSince users can store personal data online and can be able to retrieve the data or remotely store newlineand manage via the internet. Authentication and authorization must be provided perfectly as newlineillegal users may reveal the Information of data stored and the symmetric key information used by newlinethe users. The users may use PC s, Mobile devices or laptops for sending the data to the cloud newlinestore. If illegal user gets permission may disclose sensitive data it is to be prevented. The cloud newlineusers may store their sensitive data and also stores the public/private keys in the cloud servers for newlineaccessing data in future. These data and public/private keys must be preserved carefully. newlineWhenever user requests data first user has to get their public/private key from servers. Then with newlinethe help of these keys they access the data which are in encrypted form will be decrypted with newlinehelp of these keys. Long standing data or keys are sensitive to brute force attacks and any other newlineattacks. So Cloud Server has to take care of these issues. There is a responsibility of Cloud newlineServers to attain all these issues. This is a challenging issue for the cloud servers. This is the newlineresponsibility of Cloud Servers to create trust on them in-order to increase the cloud users. Cloud newlinestorage point access to the user or data storage point access in the cloud server to the user is to be newlinerestricted with some conditions. By this, the privacy and security matters using the cloud newlineenvironment are being important and typical due to the elastic, scalable, and virtualized nature of newlinecloud resources. newline
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titlePublic Auditing Technique for Securing Privacy in Cloud Storage Using Modified Elliptic Curve Diffie Hellmann Algorithm
dc.title.alternative
dc.creator.researcherNagesh, O. Sri
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Artificial Intelligence
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideKumar, Tapas
dc.publisher.placeFaridabad
dc.publisher.universityLingayas University
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2013
dc.date.completed2018
dc.date.awarded
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File167.45 kBAdobe PDFView/Open
02_prelim pages.pdf185.64 kBAdobe PDFView/Open
03_content.pdf261.75 kBAdobe PDFView/Open
04_abstract.pdf88.66 kBAdobe PDFView/Open
05_chapter 1.pdf495.01 kBAdobe PDFView/Open
06_chapter 2.pdf1.21 MBAdobe PDFView/Open
07_chapter 3.pdf403.97 kBAdobe PDFView/Open
08_chapter 4.pdf509.91 kBAdobe PDFView/Open
09_chapter 5.pdf515.07 kBAdobe PDFView/Open
10_chapter 6.pdf350.74 kBAdobe PDFView/Open
11_annexures.pdf306.32 kBAdobe PDFView/Open
80_recommendation.pdf414.84 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: