Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/594819
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2024-10-11T10:59:26Z-
dc.date.available2024-10-11T10:59:26Z-
dc.identifier.urihttp://hdl.handle.net/10603/594819-
dc.description.abstractCloud Computing refers to the use of computer resources as a service on demand via the newlineInternet. It is mainly based on data and applications outsourcing, traditionally stored on users newlinecomputers, to remote servers (data centers) owned, administered, and managed by third parties. Data newlinesecurity is a common concern for all technologies. However, it becomes a major challenge when newlineapplied to an uncontrolled environment like Cloud Computing. It is important to distinguish between newlinethe security risks associated with all IT infrastructures and those introduced by the use of Cloud newlineComputing. These risks are generally associated with open, shared, and distributed environments. newlineTherefore, when analyzing the risks, it is important to separate existing problems from those raised newlineby Cloud Computing. newlineComputing remotely also brings with it the most sensitive and significant aspect of data newlinesecurity. Data being resident on servers and infrastructure that are opaque to users brings with it the newlinehuge advantage of ridding users of all the infrastructure operational liabilities. But this also means newlinethe data owned by users navigates through routes either unknown or no control territory. This newlineglaringly brings the security of data on the cloud with high vulnerability. The first research work newlineexplores dimensionally various such vulnerabilities and related strategies to circumvent them does newlineinvolve a sensitive section of modern technology in today s world of computing. An insight through newlinevarious levels of infrastructure, application, data, and network architecture gives this research newlineenough evidence that the complexities involved in maintaining the security problems of cloud newlinecomputing is nevertheless a path most discussed and debated. newlineDue to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable newlineor could land in demilitarized zones. In the second research work, an attempt is made to explore and newlinefinally propose a trust-based malware detection based on optimal data classification. An improved newlineglowworm swarm opti
dc.format.extent136
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDesign Trust Based Malware Detection System for Secure Cloud Computing
dc.title.alternative
dc.creator.researcherManjushree, C V
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Interdisciplinary Applications
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideNandakumar, A N
dc.publisher.placeBelagavi
dc.publisher.universityVisvesvaraya Technological University, Belagavi
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2015
dc.date.completed2024
dc.date.awarded2024
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File298.1 kBAdobe PDFView/Open
02_prelim pages.pdf563.55 kBAdobe PDFView/Open
03_content.pdf308.99 kBAdobe PDFView/Open
04_abstract.pdf464.8 kBAdobe PDFView/Open
05_chapter 1.pdf528.67 kBAdobe PDFView/Open
06_chapter 2.pdf231.18 kBAdobe PDFView/Open
07_chapter 3.pdf236.05 kBAdobe PDFView/Open
08_chapter 4.pdf322.43 kBAdobe PDFView/Open
09_chapter 5.pdf379.5 kBAdobe PDFView/Open
10_annexures.pdf149.13 kBAdobe PDFView/Open
11_chapter 6.pdf321.5 kBAdobe PDFView/Open
80_recommendation.pdf58.42 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: