Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/600705
Title: An Efficient Biometric Based Privacy Protection System for Data Search
Researcher: Motghare, Sarita M.
Guide(s): Nair, Pramod S.
Keywords: Computer Science
Computer Science Software Engineering
Dynamic Searching
Engineering and Technology
Privacy Preserving
Provable Secure
Regenerating Data
Third Party Auditing
University: Medi Caps University, Indore
Completed Date: 2024
Abstract: Ensuring the security of outsourced data in cloud storage is of utmost importance, as it newlineinvolves protecting against any potential corruption or unauthorized access. This includes newlineimplementing measures to prevent any unnecessary loss of data integrity and ensuring newlineprompt detection and rectification of any breaches. In the past, impact codes were valued newlinefor their superior quality as they had a smaller data size, enabling them to accommodate newlineminor failures. However, the recent trend in remote monitoring has led to the newlinedevelopment of coded programming that solely focuses on private audits. This approach newlinenecessitates data owners to be constantly online and responsible for auditing and newlinerepairing, which is not feasible. newlineThe manufacturer suggests a public audit for the manufacturing code primarily stored in newlinethe cloud. In order to enhance the recovery process of failed authenticators in the absence newlineof data owners, the manufacturer introduces a privileged proxy to assist in recovering the newlineauthenticators within the standard public auditing system. Our system will liberate data newlinecontract holders from the burden of online pressure by utilizing novel public newlineauthenticators, which are discreetly passed on through a stack of keys. Additionally, we newlinemay recover abused isolated keys to enhance security measures. Nowadays, cloud newlinestorage is commonly used as the main storage solution for external data. newlineProtecting this data from security breaches is a major obstacle. The information network newlinehas seen a significant increase in the growth of private or semi-private information, but newlinethe search mechanisms have been unable to effectively tackle the issue of privacy newlinesafeguards. Privacy protection plays a crucial role in conducting diverse data mining newlineoperations within information networks, where encrypted data is stored across various newlinestorage systems. The creation of a resilient mechanism to tolerate and protect against data newlinecorruption is a complex endeavor. Furthermore, In the absence of a sufficient audit newlinemechanism, t
Pagination: All pages
URI: http://hdl.handle.net/10603/600705
Appears in Departments:Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File164.87 kBAdobe PDFView/Open
02_prelim pages.pdf707.14 kBAdobe PDFView/Open
03_content.pdf175.5 kBAdobe PDFView/Open
04_abstract.pdf163.1 kBAdobe PDFView/Open
05_chapter 1.pdf81.09 kBAdobe PDFView/Open
06_chapter 2.pdf235.3 kBAdobe PDFView/Open
07_chapter 3.pdf2.33 MBAdobe PDFView/Open
08_chapter 4.pdf1.19 MBAdobe PDFView/Open
09_chapter 5.pdf357.16 kBAdobe PDFView/Open
10_annexures.pdf2.04 MBAdobe PDFView/Open
10_chapter 6.pdf205.59 kBAdobe PDFView/Open
11_chapter 7.pdf302.39 kBAdobe PDFView/Open
12_chapter 8.pdf2.38 MBAdobe PDFView/Open
13_chapter 9.pdf105 kBAdobe PDFView/Open
80_recommendation.pdf264.84 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: