Scattered simultaneous and autonomous access to scrambled cloud databases
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
Cloud data environments square measure unpleasantly tempting for the preparing of tremendous scale applications owing to their amazingly ascendible and offered foundation. Data as a Service (DBaaS) model is utilized to oversee databases in cloud setting. Secure DBaaS standard gives data classification to distributed storage. Secure DBaaS is expected to allow various and independent buyers to append to the cloud while not middle server. Documents, data structures and data square measure encoded before exchange to the cloud. Different cryptography methods square measure won't to change over plain content into scrambled data. Table names and their section names likewise are scrambled inside of the cloud data wellbeing subject. The framework underpins topographically conveyed buyers to append on to A scrambled cloud data. Amid this paper we tend to quadrangular measure proposing new plan that coordinate distributed storage administration with data protection and have a component of flogging cohappening operations on scrambled data and together with the topographically dispersed buyers to connect on to these cloud data that is encoded and that they conjointly given to execute their operations over the cloud data. This configuration disposes of the dealers (Intermediate intermediaries) it constrains the quantifiability, flexibility, availability. High touchy data square measure encoded by RSA cryptography and standard data square measure scrambled abuse AES method so overhead on the system will be decreased.
Authors and Affiliations
B. Mahalakshmi Rao| M.tech(Research scholar) in Dept computer science & engineering, kakinada institute of engineering & technology, korangi,AP,India, K. Ravi Kumar| Associate. Professor &HOD in Dept computer science & engineering, kakinada institute of engineering & technology for women,korangi,AP,India
Privacy Preservation and traceability support using Public Auditing Mechanism
as future enhancement, we enhance the Oruta system in two interesting problems we will continue the study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the ori...
A Unified Control Startergy For Three Phase Inverter In Dg
This paper presents a neutral point clamped technique based three-phase inverter with grid connected system that operates in both islanded and grid-tied modes. This paper presents the detailed analysis and the parame...
Network Intrusion Detection Systems Using Genetic Algorithm
Intruder Detection system is so important implementations which considers all network information like temporal and spatial which make the system to build the rule for IDS. This helps for the administrator to detect...
Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services
The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general...
Habitual Test Packet Generation And Fault Localization
Networks are getting larger and more complex, yet administrators rely on rudimentary tools such as and to debug problems. We propose an automated and systematic approach for testing and debugging networks called “A...