Ensuring Security and Completeness of Query Results in Cloud
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 3
Abstract
Cloud technology provides data storage services to users to store large amount of data and also provides services that perform data processing. While data comes from different servers on cloud and the processing of the data is again done on different server, users must be assured about the integrity of the query results. Various applications need to perform the join operation on the data fetched from different data storage servers and send the join result to the client. The integrity methods described provide a way for the user to verify whether query results obtained after retrieving data are correct that no valid data is missing. Integrity check ensures that the data is complete and authentic. Encryption provides data protection for the query results.
Authors and Affiliations
Sharayu Anap
A New Technique of Automated Sericulture Based on IoT
Seasonal variations in environmental factors have a significant impact on genotypic expressions in forms of the phenotypic outputs in silkworm crops, such as a cocoon’s weights, shell’s weights, & cocoon’s shells ratios....
INFORMATION SECURITY AWARENESS IN CORPORATE GOVERNANCE
The matrix analysis of the literature review in this study succeeded in producing factors that contribute to information security awareness. Information security awareness plays an important role in the continuity of an...
Opportunities at Higher Education Institutes in India: Small Cases on Enhancing Skills
This article basically tries to explain that opportunities are the key to success and how students can take advantage and learn new skills or to enhance existing ones. it is an understanding of the opportunities and usin...
Text Mining: Process and Techniques
Massive amount of digital data is available in form of unstructured text. It is highly required to extract useful information from this textual data. The process to discover non-trivial information and knowledge which ar...
IoT Based Intelligent Traffic Management and Violators Recognition System
This paper presents a new system to manage traffic in a high congested area. The IoT technology is utilized for traffic management and identification of defaulters. The raspberry-pi, RFID, and IR sensors are used to impl...