Providing Distinguish Access Levels to Encrypted Cloud Databases
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 7
Abstract
Outsourcing sensitive and crucial data in the hands of a cloud provider should come with the guarantee of security and seamless availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.
Authors and Affiliations
Mohammad Juned Ansari| M.Tech (CSE), Nimra Institute of Science and Technology, A.P., India, Syed Yasin| Head of the Department, Dept. of Computer Science & Engineering, Nimra Institute of Science and Technology, A.P., India
Achieving Privacy and Security In Multi Owner Cloud Using Novel Secure Search Protocol And AES
Cloud computing provide benefits of individual users and organizations which minimizes investment and resource usage cost. Data owners forwarding the data to cloud servers without local data management and data users...
An Exploration Approach To Progress The Rank Privacy In Data Collection
A hierarchical clustering strategy is proposed to bolster more pursuit semantics and furthermore to take care of the demand for quick ciphertext seek inside a major information condition. The proposed various hierarc...
Design and Analysis of a Propeller Shaft in CAE tool and ANSYS
A Propeller Shaft is a device on which a propeller is attached to and transfers the power from the engine to the propeller. In the design of automobiles, the industry is exploiting in order to obtain reduction of wei...
Intra cluster similarity of clique by positive and negative objects
Clustering of high dimensional data sets is a challenge in now a days. Finding of good clusters is a big problem for the researchers. The outlier detection of clusters and finalize about the noisy data also an import...
Real-Time Patient Health Care Monitoring and Conditioning System Implementation Using Raspberry Pi
Recent advances in mobile technology and microcontrollers have inspired various designs of Internet of Things - based health care services and devices. Using the Internet of Things, medical data can be collected and...