Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/510082
Title: A new secured cloud data storage and communication system using cryptographic techniques
Researcher: Nithisha, J
Guide(s): Jesu Jayarin, P
Keywords: Cloud computing
Communication system
Computer Science
Computer Science Information Systems
Cryptographic techniques
Engineering and Technology
University: Anna University
Completed Date: 2023
Abstract: Recently, the cloud computing and networking technologies are newlinegrowing fast and the number of clients and users are also increasing newlineenormously. Due to the rapid development of the cloud environments with newlinedata and also need to protect the resources that are provided by companies for newlinetheir employees. Major issues of cloud computing are to provide security to newlinethe data, resources and their communications. For this purpose, this thesis newlineproposes a new secured storage and communication system for secured data newlinestorage and communication efficiently. This research work contains three newlinedifferent secured storage mechanisms for secured data storage and newlinecommunication. The three mechanisms applied thirteen newly developed newlinealgorithms for performing the key generation, encryption, decryption, newlineauthorization and authentication effectively. Translation and Elliptic Curve Cryptography for performing the key generation, encryption, decryption and authentication processes by applying the three newly developed algorithms such as Matrix Translation and Elliptic newlineCurve Cryptography based Encryption Algorithm (MECEA), Matrix newlineTranspose bato generate the secret keys for the cloud users to access the encrypted data newlinethat are taken from cloud server. Second work, a new secured storage and communication system is cloud database. This work applies Elliptic Curve and Polynomial Congruence newlinetal signature. This work applies seven algorithms such as Prime number generation algorithm, Key generation for DSA, Key generation for ECC, Signature Creation Algorithm, newlineSignature Verification Algorithm, ECC and Polynomial Congruence aware newlineEncryption and ECC and Polynomial Congruence aware Decryption. newlineMoreover, a new Elliptic Curve and Polynomial Congruence aware newlineEncryption and Decryption algorithms have been developed for performing newlinethe data encryption and decryption in the process of data storage and newlinecommunication in cloud. Third work, a new secured storage mechanism has been proposed newlineand implemented in this work to provide data security while storing and newlineure and ECC aware Key Generation Algorithm introduced for performing the key generation, encryption and decryption processes effectively. The experimental and comparative results are proved that the performance of the three different secured storage mechanisms and also newlinecompared the performance in terms of key generation time, encryption time, newlinedecryption time and security level for identifying the best security mechanisms to perform the secured data storage and data communications newlineeffectively newline newline
Pagination: xvi,143p.
URI: http://hdl.handle.net/10603/510082
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File18.4 kBAdobe PDFView/Open
02_prelim pages.pdf3.85 MBAdobe PDFView/Open
03_content.pdf31.6 kBAdobe PDFView/Open
04_abstract.pdf241.64 kBAdobe PDFView/Open
05_chapter 1.pdf630.21 kBAdobe PDFView/Open
06_chapter 2.pdf275.27 kBAdobe PDFView/Open
07_chapter 3.pdf305.21 kBAdobe PDFView/Open
08_chapter 4.pdf693.48 kBAdobe PDFView/Open
09_chapter 5.pdf1.06 MBAdobe PDFView/Open
10_chapte r6.pdf895.93 kBAdobe PDFView/Open
11_annexures.pdf3.26 MBAdobe PDFView/Open
80_recommendation.pdf152.6 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: