Efficient cloud security practices with privacy preserving access control schemes and secure outsourced data deletion

dc.contributor.guideSenthil Kumar J
dc.coverage.spatialEfficient cloud security practices with privacy preserving access control schemes and secure outsourced data deletion
dc.creator.researcherAbinaya P
dc.date.accessioned2025-06-11T10:10:07Z
dc.date.available2025-06-11T10:10:07Z
dc.date.awarded2025
dc.date.completed2025
dc.date.registered
dc.description.abstractThe proliferation of cloud computing technology has led to a newlinegrowing trend among organizations and users to utilize cloud storage for the newlinepurpose of simple data storage and sharing. Nevertheless, the privacy and newlinesecurity of data may be exposed when it is stored within a third-party cloud newlinestorage service provider. The practice of outsourcing data to cloud servers newline(CS) has the potential to greatly diminish the administrative costs and storage newlineresponsibilities faced by both people and business ventures. newlineEnsuring the secure deletion of sensitive data stored in the cloud is newlinea crucial necessity when such data is no longer required. The ensured deletion newlineof data in cloud storage is faced with numerous challenges due to several newlineprominent characteristics, including virtualization, multi-tenancy, high newlineavailability, and platform complexity. These challenges must be effectively newlineaddressed in order to ensure the successful deletion of data. Consumers have newlinean expectation that when they initiate a deletion request for their data, the data newlinewould become permanently unreachable. newlineHowever, consumers are uncertain about the capability of the newlineCloud Service Provider (CSP) to effectively execute the deletion process to newlineprevent any potential data leakage. Hence, despite the encryption of data as newlineciphertext within the CSP, an inherent risk remains that cannot be avoided. As newlinean illustration, the CSP may opt to transfer data to various cloud storage newlineservers in order to guarantee a promising level of accessibility. newlineemove all existing backups of the data.
dc.description.note
dc.format.accompanyingmaterialNone
dc.format.dimensions21 cm
dc.format.extentxvii,128p.
dc.identifier.researcherid
dc.identifier.urihttp://hdl.handle.net/10603/645683
dc.languageEnglish
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.relationp.115-127
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordCloud Servers
dc.subject.keywordCloud Service Provider
dc.subject.keywordMerkle Hash Tree
dc.titleEfficient cloud security practices with privacy preserving access control schemes and secure outsourced data deletion
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 11
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
24.64 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_prelim_pages.pdf
Size:
2.96 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_contents.pdf
Size:
404.39 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_abstracts.pdf
Size:
296.46 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter1.pdf
Size:
418.8 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: