Providing Distinguish Access Levels to Encrypted Cloud Databases
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 7
Abstract
Outsourcing sensitive and crucial data in the hands of a cloud provider should come with the guarantee of security and seamless availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.
Authors and Affiliations
Mohammad Juned Ansari| M.Tech (CSE), Nimra Institute of Science and Technology, A.P., India, Syed Yasin| Head of the Department, Dept. of Computer Science & Engineering, Nimra Institute of Science and Technology, A.P., India
To Provide An Innovative Policy Anomaly Management Framework For Firewalls
Firewalls have been widely organized on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to choose whether to accept or discard the packet based on its policy. Optimizing...
Review on Data Hiding Schemes into Multimedia Data
In this period of internet, Multimedia data security is crucial issue because there are many cases of illegal production and redistribution through the Internet. Data hiding and encryption algorithms can be used for...
An Suitable Minimum Utility Threshold By Trial And Error Is A Tedious Process For Users
We address the above issues by proposing another system for top-k high utility itemset mining, where k is the coveted number of HUIs to be mined. Two sorts of effective calculations named TKU (mining Top-K Utility it...
Dynamics Of Multi layered Composite Shell With Shape Memory Alloys
The use of different composite materials has been continuously growing in recent years. Although many applications for composite materials have been identified. Extensive research is still being carried out in order...
Solar PV and Battery Storage Integration System Using Three Level NPC Inverter
In this work, another setup of a three-level neutral pointclipped (NPC) inverter that can incorporate sun powered photovoltaic (PV) with battery stockpiling in a lattice associated framework is proposed. The quality of...