Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/470256
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2023-03-16T10:06:00Z | - |
dc.date.available | 2023-03-16T10:06:00Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/470256 | - |
dc.description.abstract | In the cloud environment, cloud storage is considered to be an essential service in present days. newlineSince users can store personal data online and can be able to retrieve the data or remotely store newlineand manage via the internet. Authentication and authorization must be provided perfectly as newlineillegal users may reveal the Information of data stored and the symmetric key information used by newlinethe users. The users may use PC s, Mobile devices or laptops for sending the data to the cloud newlinestore. If illegal user gets permission may disclose sensitive data it is to be prevented. The cloud newlineusers may store their sensitive data and also stores the public/private keys in the cloud servers for newlineaccessing data in future. These data and public/private keys must be preserved carefully. newlineWhenever user requests data first user has to get their public/private key from servers. Then with newlinethe help of these keys they access the data which are in encrypted form will be decrypted with newlinehelp of these keys. Long standing data or keys are sensitive to brute force attacks and any other newlineattacks. So Cloud Server has to take care of these issues. There is a responsibility of Cloud newlineServers to attain all these issues. This is a challenging issue for the cloud servers. This is the newlineresponsibility of Cloud Servers to create trust on them in-order to increase the cloud users. Cloud newlinestorage point access to the user or data storage point access in the cloud server to the user is to be newlinerestricted with some conditions. By this, the privacy and security matters using the cloud newlineenvironment are being important and typical due to the elastic, scalable, and virtualized nature of newlinecloud resources. newline | |
dc.format.extent | ||
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Public Auditing Technique for Securing Privacy in Cloud Storage Using Modified Elliptic Curve Diffie Hellmann Algorithm | |
dc.title.alternative | ||
dc.creator.researcher | Nagesh, O. Sri | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Artificial Intelligence | |
dc.subject.keyword | Engineering and Technology | |
dc.description.note | ||
dc.contributor.guide | Kumar, Tapas | |
dc.publisher.place | Faridabad | |
dc.publisher.university | Lingayas University | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | 2013 | |
dc.date.completed | 2018 | |
dc.date.awarded | ||
dc.format.dimensions | ||
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 167.45 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 185.64 kB | Adobe PDF | View/Open | |
03_content.pdf | 261.75 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 88.66 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 495.01 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 1.21 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 403.97 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 509.91 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 515.07 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 350.74 kB | Adobe PDF | View/Open | |
11_annexures.pdf | 306.32 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 414.84 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: