Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/600706
Title: | An Efficient Biometric Based Privacy Protection System for Data Search |
Researcher: | Motghare, Sarita M. |
Guide(s): | Nair, Pramod S. |
Keywords: | Computer Science Computer Science Software Engineering Dynamic Searching Engineering and Technology Privacy Preserving Provable Secure Regenerating Data Third Party Auditing |
University: | Medi Caps University, Indore |
Completed Date: | 2024 |
Abstract: | Ensuring the security of outsourced data in cloud storage is of utmost importance, as it newlineinvolves protecting against any potential corruption or unauthorized access. This includes newlineimplementing measures to prevent any unnecessary loss of data integrity and ensuring newlineprompt detection and rectification of any breaches. In the past, impact codes were valued newlinefor their superior quality as they had a smaller data size, enabling them to accommodate newlineminor failures. However, the recent trend in remote monitoring has led to the newlinedevelopment of coded programming that solely focuses on private audits. This approach newlinenecessitates data owners to be constantly online and responsible for auditing and newlinerepairing, which is not feasible. newlineThe manufacturer suggests a public audit for the manufacturing code primarily stored in newlinethe cloud. In order to enhance the recovery process of failed authenticators in the absence newlineof data owners, the manufacturer introduces a privileged proxy to assist in recovering the newlineauthenticators within the standard public auditing system. Our system will liberate data newlinecontract holders from the burden of online pressure by utilizing novel public newlineauthenticators, which are discreetly passed on through a stack of keys. Additionally, we newlinemay recover abused isolated keys to enhance security measures. Nowadays, cloud newlinestorage is commonly used as the main storage solution for external data. newlineProtecting this data from security breaches is a major obstacle. The information network newlinehas seen a significant increase in the growth of private or semi-private information, but newlinethe search mechanisms have been unable to effectively tackle the issue of privacy newlinesafeguards. Privacy protection plays a crucial role in conducting diverse data mining newlineoperations within information networks, where encrypted data is stored across various newlinestorage systems. The creation of a resilient mechanism to tolerate and protect against data newlinecorruption is a complex endeavor. Furthermore, In the absence of a sufficient audit newlinemechanism, t |
Pagination: | All pages |
URI: | http://hdl.handle.net/10603/600706 |
Appears in Departments: | Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 164.87 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 707.14 kB | Adobe PDF | View/Open | |
03_content.pdf | 175.5 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 163.1 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 81.09 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 235.3 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 2.33 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.19 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 357.16 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 2.04 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 205.59 kB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 302.39 kB | Adobe PDF | View/Open | |
12_chapter 8.pdf | 2.38 MB | Adobe PDF | View/Open | |
13_chapter 9.pdf | 105 kB | Adobe PDF | View/Open | |
14_chapter 10.pdf | 102.54 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 264.84 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: