Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/202865
Title: Development of Confidentiality Integrity Authentication Model for Assuring Data Security in Cloud Computing
Researcher: Veeralakshmi P.
Guide(s): Dr. Latha Tamilselvan
Keywords: Confidentiality, Integrity, Authentication Model, Data Security, Cloud Computing
University: B S Abdur Rahman University
Completed Date: 03/04/2018
Abstract: Cloud can be envisioned as a working model for providing an environment which enables the cloud users to access a shared pool of newlinevirtualized and configurable computing resources that can be easily provisioned as services on the pay-per-use manner from the cloud service newlineproviders. Amongst the services, the cloud storage services gain more newlineattraction due to the growth of digital data at an incredible rate. By utilizing newlinethe cloud storage services, the cloud users can be relieved from the burden newlineof local data storage and maintenance. But, the users are unaware of the newlineexact location of the remotely stored data. This unique feature imposes many newlinesecurity challenges like data theft, damage of information, disruption of newlineservices, loss of privacy, etc., on the data stored in the cloud. In order to newlinealleviate the challenges, this research aims at developing a CIA newline(Confidentiality, Integrity and Authentication) model for cloud computing so newlinethat the data stored in the cloud are confidential, integral and authenticated. newlineCloud users depend on cloud for storage of massive amount of data. newlineBefore storing the data, the data owner should imply the proper security newlinemechanism that ensures confidentiality, integrity and authentication in order newlineto protect the stored data from unauthorized access. In cloud, confidentiality newlineof data can be compromised by applying the attacks like data leakage, newlinephishing and eavesdropping. To overcome this, this research aims at newlinedeveloping a new encryption algorithm called 2-keys symmetric encryption newlinealgorithm that can be used for the encryption of massive data. This newlineencryption procedure incurs lesser computation overhead and minimum time newlinefor performing encryption and decryption. newlineData integrity is ensured by generating the metadata for the data to be newlinestored in cloud by utilizing the position of individual characters of the data newlineblocks. This metadata is attached to the encrypted data blocks and is stored newlinein the cloud storage servers. Then, the originality of data can be verified by newlinethe data owner
Pagination: 162
URI: http://hdl.handle.net/10603/202865
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
abtract.pdfAttached File107.99 kBAdobe PDFView/Open
chapter 1.pdf359.08 kBAdobe PDFView/Open
chapter 2.pdf353.56 kBAdobe PDFView/Open
chapter 3.pdf716.57 kBAdobe PDFView/Open
chapter 4.pdf744.18 kBAdobe PDFView/Open
chapter 5.pdf992.5 kBAdobe PDFView/Open
chapter 6.pdf509.37 kBAdobe PDFView/Open
chapter 7.pdf104.97 kBAdobe PDFView/Open
references.pdf230.58 kBAdobe PDFView/Open
table of contents.pdf247.13 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.