Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/594126
Title: An investigation on replication and encryption strategies for ensuring strong security in cloud
Researcher: Lavanaya, S
Guide(s): Saravanakumar, N M
Keywords: Computer Science
Computer Science Information Systems
efficient replication strategies
Engineering and Technology
proliferation of distributed systems
sensitive data
University: Anna University
Completed Date: 2024
Abstract: The proliferation of distributed systems and the increasing volume newlineof sensitive data they handle demand robust security measures. This research newlineintroduces a comprehensive approach that combines an enhanced newlineauthentication method, efficient replication strategies, and a state-of-the-art newlineencryption algorithm to safeguard data in cloud computing. The enhanced newlineauthentication method leverages multi-factor authentication, biometrics, and newlinebehavioural analysis to fortify access control, ensuring that only authorized newlineusers can interact with the system. This not only enhances security but also newlineimproves user experience and mitigates the risk of unauthorized access. newlineThe proposed methods of authentication includes enhanced newlinegraphical password authentication and secured two factor authentication newlineoffers strong solution for user s to maintain their accounts online in a safe newlineway. The graphical password verifies the scenario of different authentication newlinemethods and brings out a novel idea of choosing images and its points by the newlineuser on their own to build a secure environment. The password generated by newlinethis techniques improves security, reduced storage space and login time spend newlineby the user compared to state of art literature study. newlineThe two factor authentication is said to be easiest and strongest newlineway to secure user environment in the current era. This is used by all the newlineapplication hosters in cloud includes banking sectors, government agencies, newlinehealthcare applications and any mission critical intensive applications. This newlinemethod encounters an issue and still the hosters insist the user s not to reveal newlineone time password to any outsiders. In order to avoid this, a secured two newlinefactor authentication mechanism is introduced in this research to enhance newlinesecurity. newline newline
Pagination: xiv,171p.
URI: http://hdl.handle.net/10603/594126
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.84 kBAdobe PDFView/Open
02_prelim pages.pdf2.73 MBAdobe PDFView/Open
03_content.pdf36.53 kBAdobe PDFView/Open
04_abstract.pdf90.15 kBAdobe PDFView/Open
05_chapter1.pdf616.35 kBAdobe PDFView/Open
06_chapter2.pdf260.87 kBAdobe PDFView/Open
07_chapter3.pdf658.83 kBAdobe PDFView/Open
08_chapter4.pdf1.14 MBAdobe PDFView/Open
09_chapter5.pdf610.69 kBAdobe PDFView/Open
10_annexures.pdf145.94 kBAdobe PDFView/Open
80_recommendation.pdf110.82 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: