Ensuring Security and Completeness of Query Results in Cloud

Abstract

Cloud technology provides data storage services to users to store large amount of data and also provides services that perform data processing. While data comes from different servers on cloud and the processing of the data is again done on different server, users must be assured about the integrity of the query results. Various applications need to perform the join operation on the data fetched from different data storage servers and send the join result to the client. The integrity methods described provide a way for the user to verify whether query results obtained after retrieving data are correct that no valid data is missing. Integrity check ensures that the data is complete and authentic. Encryption provides data protection for the query results.

Authors and Affiliations

Sharayu Anap

Keywords

Related Articles

A New Technique of Automated Sericulture Based on IoT

Seasonal variations in environmental factors have a significant impact on genotypic expressions in forms of the phenotypic outputs in silkworm crops, such as a cocoon’s weights, shell’s weights, & cocoon’s shells ratios....

INFORMATION SECURITY AWARENESS IN CORPORATE GOVERNANCE

The matrix analysis of the literature review in this study succeeded in producing factors that contribute to information security awareness. Information security awareness plays an important role in the continuity of an...

Opportunities at Higher Education Institutes in India: Small Cases on Enhancing Skills

This article basically tries to explain that opportunities are the key to success and how students can take advantage and learn new skills or to enhance existing ones. it is an understanding of the opportunities and usin...

Text Mining: Process and Techniques

Massive amount of digital data is available in form of unstructured text. It is highly required to extract useful information from this textual data. The process to discover non-trivial information and knowledge which ar...

IoT Based Intelligent Traffic Management and Violators Recognition System

This paper presents a new system to manage traffic in a high congested area. The IoT technology is utilized for traffic management and identification of defaulters. The raspberry-pi, RFID, and IR sensors are used to impl...

Download PDF file
  • EP ID EP748798
  • DOI -
  • Views 40
  • Downloads 0

How To Cite

Sharayu Anap (2015). Ensuring Security and Completeness of Query Results in Cloud. International Journal of Innovative Research in Computer Science and Technology, 3(3), -. https://europub.co.uk/articles/-A-748798