Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/592183
Title: | Design and analysis of cryptographic schemes for secure data processing in distributed storage systems |
Researcher: | V S, Lakshmi |
Guide(s): | P P, Deepthi |
Keywords: | Data confidentiality Data integrity Distributed storage Engineering Engineering and Technology Engineering Electrical and Electronic Homomorphic encryption Regenerating codes |
University: | National Institute of Technology Calicut |
Completed Date: | 2020 |
Abstract: | The advancement in internet of things (IoT) and its adoption in every aspect of life has triggered many applications which led to an exponential increase in the global data generation rate. Distributed storage systems (DSS) offer a promising solution to the ever growing need for a flexible and scalable storage resource. In order to ensure data availability in DSS, data is redundantly stored among several inexpensive storage devices. Among the various methods for incorporating data redundancy, regenerating codes (RC) form an advanced coding technique which provide data availability with an optimal trade off between storage overhead and repair bandwidth overhead. Distributed storage architecture is widely adopted by cloud storage systems and wireless sensor networks (WSNs). In WSN the data is freely accessible over wireless channels; while in cloud platform, the data is stored in untrusted third-party cloud servers. Therefore ensuring data security and reliability is paramount in these DSS applications. Traditional encryption schemes protect data confidentiality; but they cannot support processing operations in encrypted domain (ED). In order to support various data processing services in DSS applications without sacrificing security, the encryption scheme should have homomorphic properties. Also, ensuring data reliability and integrity in DSS is a challenging task because the data in the nodes may get corrupted through channel errors, storage/memory errors or tampering by intentional adversaries. This research work aims to design and develop methods to fortify data reliability, confidentiality and integrity in distributed storage applications while supporting various data processing operations. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/592183 |
Appears in Departments: | Department of Electronics and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 93.39 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 855.71 kB | Adobe PDF | View/Open | |
03_content.pdf | 102.97 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 58.26 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 129.39 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 265.61 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.72 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 2.25 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.49 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 3.32 MB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 4.35 MB | Adobe PDF | View/Open | |
12_annexures.pdf | 103.91 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 119.79 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: