NUST Institutional Repository

Secure Verifiability of Outsourced Data with Client Verification

Show simple item record

dc.contributor.author Malik, Wajahat Sultan
dc.contributor.author Supervised by Dr. Fawad Khan.
dc.date.accessioned 2020-11-12T07:37:18Z
dc.date.available 2020-11-12T07:37:18Z
dc.date.issued 2020-09
dc.identifier.other TIS-309
dc.identifier.other MSIS-17
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/11576
dc.description.abstract The information security requirements are increasing due to huge expansion of data in various fields. For the Clients with the limited resources, dealing with huge data is always been a significant problem. Cloud computing offers a variety of interconnected resources to its users. Heavy computations are always been a problem for resource constrained devices. This problem is reduced to a greater limit as cloud computing provide ease to the users by providing the facility of outsourcing their different complex computational work along with utilizing the huge data storage of the Cloud servers. At the same time, the existence of untrusted service provider creates the problem of lack of effective controllability of outsourced data by the legitimate users, as clients may not be certain enough to have a complete smooth control over outsourced data. Hence the need to have secure outsourced data gets more strengthened. In this thesis, we have suggested a secure mechanism for outsourcing the data, its update, data / client verification along with data encryption. The cloud server is asked to have complex computations and return the desired data. In case of any change, corruption or dummy data is returned by the cloud server, the querying client identifies the error, and can change or update the existing data securely. This whole process is monitored by the client through generation of proofs. Moreover, in contrast to existing works in literature, the proposed scheme takes into consideration of the ownership verification, prior to entertaining any of the queries. The major intend is to have a higher level of efficiency and reduced computational costs for clients. The performance evaluation shows its effectiveness for resource constrained devices. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Secure Verifiability of Outsourced Data with Client Verification en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account