Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/527433
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-11-24T06:38:01Z-
dc.date.available2023-11-24T06:38:01Z-
dc.identifier.urihttp://hdl.handle.net/10603/527433-
dc.description.abstractA growing trend in many commercial firms and Information newlineTechnology (IT) organizations is data storage in the cloud environment. newlineThe method of storing data online on virtual computers in the cloud is newlineknown as cloud storage. Multiple users and distributed resources can newlineaccess the stored data in the cloud environment. newlineUtilizing cloud computing similarities and redundancies newlinereduces deduplication. Data stored with public cloud providers would be newlineexposed to both internal and external risks because they are unreliable. newlineTraditional encryption may be employed for storage, but most cloud newlinedata needs to be processed further. Decryption prior to calculation will newlineresult in considerable overheads for data operations and be quite newlineannoying. As a result, efficient methods for securing and maintaining newlinethe privacy of enormous volumes of data stored in the cloud are needed. newlineThis work has proposed a Privacy Protection Domain-User newlineIntegra Tag Deduplication (DUIT) in Cloud Data Server for overcome newlinethe data deduplication problem and privacy leakage in muti-domain cloud newlinedata server. Proposed method is based on expert observation and newlinedelivers an approximation of a solution for reducing redundant data in newlinecloud server. It also provides resists brute-force attacks. Brute-force newlinedictionary threats have been studied in cloud storage auditing with high newlineprivacy protection, as well as methods to fend them off and achieve newlinev newlinededuplication. A unique technique is introduced to generating the file newlineindex and a method to generating the key for file encryption to achieve newlinededuplication while maintaining strong privacy protection. newlineSecondly High performance data deduplication grade byte newlinecheck algorithm with efficient fuzzy search technique is proposed that , newlineimparts flexibility in reducing redundant data in cloud computing newlineenvironment. Then for maintain data security in cloud the encryption newlineand decryption algorithm Hyper elliptical curve cryptography used and newlinefinding a data in cloud server is very difficult for cloud user to solve this newlinefuzzy searching method
dc.format.extentvi, 148
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDesign Of Secure Cloud Data Deduplication Using Domain User Intergra Tag And Grade Byte Check With Fuzzy Search Technique
dc.title.alternative
dc.creator.researcherMOHANA PRAKASH T A
dc.subject.keywordAutomation and Control Systems
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideNIRMALRANI V
dc.publisher.placeChennai
dc.publisher.universitySathyabama Institute of Science and Technology
dc.publisher.institutionCOMPUTER SCIENCE DEPARTMENT
dc.date.registered2017
dc.date.completed2022
dc.date.awarded2023
dc.format.dimensionsA5
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
10.annexure.pdfAttached File1.32 MBAdobe PDFView/Open
1.title.pdf79.27 kBAdobe PDFView/Open
2.prelim pages.pdf797.35 kBAdobe PDFView/Open
3.abstract.pdf103 kBAdobe PDFView/Open
4.contents.pdf212.12 kBAdobe PDFView/Open
5.chapter 1.pdf548 kBAdobe PDFView/Open
6.chapter 2.pdf342.58 kBAdobe PDFView/Open
7.chapter 3.pdf1.23 MBAdobe PDFView/Open
80_recommendation.pdf79.27 kBAdobe PDFView/Open
8.chapter 4.pdf1.04 MBAdobe PDFView/Open
9.chapter 5.pdf20.45 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: