Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/594126
Title: | An investigation on replication and encryption strategies for ensuring strong security in cloud |
Researcher: | Lavanaya, S |
Guide(s): | Saravanakumar, N M |
Keywords: | Computer Science Computer Science Information Systems efficient replication strategies Engineering and Technology proliferation of distributed systems sensitive data |
University: | Anna University |
Completed Date: | 2024 |
Abstract: | The proliferation of distributed systems and the increasing volume newlineof sensitive data they handle demand robust security measures. This research newlineintroduces a comprehensive approach that combines an enhanced newlineauthentication method, efficient replication strategies, and a state-of-the-art newlineencryption algorithm to safeguard data in cloud computing. The enhanced newlineauthentication method leverages multi-factor authentication, biometrics, and newlinebehavioural analysis to fortify access control, ensuring that only authorized newlineusers can interact with the system. This not only enhances security but also newlineimproves user experience and mitigates the risk of unauthorized access. newlineThe proposed methods of authentication includes enhanced newlinegraphical password authentication and secured two factor authentication newlineoffers strong solution for user s to maintain their accounts online in a safe newlineway. The graphical password verifies the scenario of different authentication newlinemethods and brings out a novel idea of choosing images and its points by the newlineuser on their own to build a secure environment. The password generated by newlinethis techniques improves security, reduced storage space and login time spend newlineby the user compared to state of art literature study. newlineThe two factor authentication is said to be easiest and strongest newlineway to secure user environment in the current era. This is used by all the newlineapplication hosters in cloud includes banking sectors, government agencies, newlinehealthcare applications and any mission critical intensive applications. This newlinemethod encounters an issue and still the hosters insist the user s not to reveal newlineone time password to any outsiders. In order to avoid this, a secured two newlinefactor authentication mechanism is introduced in this research to enhance newlinesecurity. newline newline |
Pagination: | xiv,171p. |
URI: | http://hdl.handle.net/10603/594126 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.84 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.73 MB | Adobe PDF | View/Open | |
03_content.pdf | 36.53 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 90.15 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 616.35 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 260.87 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 658.83 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 1.14 MB | Adobe PDF | View/Open | |
09_chapter5.pdf | 610.69 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 145.94 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 110.82 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: