Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/476977
Title: | Secured cloud framework for preservation of legitimate data and restriction of unauthorized users |
Researcher: | Ponnuviji N P |
Guide(s): | Vigilson Prem M |
Keywords: | Cloud Computing Trusted Cloud Centre Kernel Extreme Learning Machine |
University: | Anna University |
Completed Date: | 2023 |
Abstract: | In real-time, cloud computing has become a prominent trend in the industry due to the numerous benefits of utilising it in all-size enterprises and organizations. It offers delivery of different services through the internet with the help of resources like tools and applications such as data storage, servers, databases, networking and software. The reasons for the organizations to opt cloud computing are cost savings, increased productivity, speed and efficiency. Despite having many advantages, the security of safeguarding huge sensitive records has always been a threat and worrying concern, even after adopting compliance measures. The foremost threat being, when many individuals access and manipulate information through a single portal. The hackers and the intruders create advertent problems when information gets transferred across an entire cloud. Even with robust security features, the scenario of hacking and intruding the secured data has become a regular routine. newlineIn this research work, few algorithms have been improved, enhanced and implemented to increase the efficiency of the security in the cloud server. The primary focus is to avoid intrusions in the cloud network during data transfer. This work uses the UNSW-NB 15 dataset, which is collected via the IXIA PerfectStorm tool for security analysis. The algorithms are designed and implemented in such a way that with the nature of cloud severs being self-organized, the intrusion detection and prevention system named Secured Cloud Data Transmission Storage and Retrieval Framework (SEC-DTSARF) has been modelled to detect and prevent various intrusions and attempts to hack the cloud data. newlineThe SEC-DTSARF cloud application has been implemented to handle three different operations in a secure and unique way. The framework works in three phases. newline |
Pagination: | xix,191p. |
URI: | http://hdl.handle.net/10603/476977 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 2.24 MB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.73 MB | Adobe PDF | View/Open | |
03_contents.pdf | 2.24 MB | Adobe PDF | View/Open | |
04_abstracts.pdf | 2.24 MB | Adobe PDF | View/Open | |
05_chapter1.pdf | 2.24 MB | Adobe PDF | View/Open | |
06_chapter2.pdf | 2.28 MB | Adobe PDF | View/Open | |
07_chapter3.pdf | 2.32 MB | Adobe PDF | View/Open | |
08_chapter4.pdf | 2.34 MB | Adobe PDF | View/Open | |
09_chapter5.pdf | 2.35 MB | Adobe PDF | View/Open | |
10_chapter6.pdf | 2.42 MB | Adobe PDF | View/Open | |
11_annexures.pdf | 222.96 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 92.81 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: