Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/509533
Title: A Novel collaborative security framework for confidentiality integrity and access control in multi cloud environment NC CIA
Researcher: Rejin Paul, N R
Guide(s): Paulraj, D
Keywords: Computer Science
Computer Science Information Systems
Confidentiality integrity
Engineering and Technology
Multi cloud environment
Security framework
University: Anna University
Completed Date: 2022
Abstract: In today s technological world, Cloud has become an integral part newlineof every human being. From tasks as simple as storing pictures to virtual newlinedrives to using complex agile project management tools, the cloud provides a newlinenumber of advanced services to its users. With its increasing demand in real newlineworld, creation of secure cloud storage systems has become inevitable. newlineHowever, like any advanced systems, creating a multi-dimensional secure newlinesystem for cloud data storage poses a number of challenges. newlineThe triad of Confidentiality, Integrity and Access control forms newlinethe core of data security in the cloud environment. While data confidentiality newlinedeals with protecting data from unauthorized access, data integrity ensures the newlinereliability and correctness of data. In order to achieve confidentiality and newlineintegrity of data, access control is essential as it ensures access of data only by newlinetrusted users. Hence, in order to achieve these vital principles, an efficient newlinedata security framework with trust-based access control is proposed. The newlinemain focus of this system is to provide restricted access to data for users as newlinewell as servers based on enhanced trust degree calculated from the user server newlinecharacteristics. Secure access control is provided by a Trust-Based Access newlineControl Mechanism (TBACM), that makes use of metrics such as newlinehonesty/dishonesty index, successful/unsuccessful interaction and satisfaction newlineof service both from user and server s standpoint. newlineFurther, this work provides an efficient data storage and newlinetransactions using a transposition encryption algorithm called Cyclic Shift newlineTransposition Algorithm (CSTA). The algorithm encrypts and saves the newlineresultant data in the Service Provider s (SP) server to avoid data leakage newlinethereby strengthening the security of the cloud. newline
Pagination: xv,125p.
URI: http://hdl.handle.net/10603/509533
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File242.29 kBAdobe PDFView/Open
02_prelim pages.pdf989.51 kBAdobe PDFView/Open
03_content.pdf9.63 kBAdobe PDFView/Open
04_abstract.pdf5.34 kBAdobe PDFView/Open
05_chapter 1.pdf297.07 kBAdobe PDFView/Open
06_chapter 2.pdf65.61 kBAdobe PDFView/Open
07_chapter 3.pdf1.51 MBAdobe PDFView/Open
08_chapter 4.pdf1.03 MBAdobe PDFView/Open
09_chapter 5.pdf286.43 kBAdobe PDFView/Open
10_chapter 6.pdf16.81 kBAdobe PDFView/Open
11_annexure.pdf74.09 kBAdobe PDFView/Open
80_recommendation.pdf65.61 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: