Scattered simultaneous and autonomous access to scrambled cloud databases
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
Cloud data environments square measure unpleasantly tempting for the preparing of tremendous scale applications owing to their amazingly ascendible and offered foundation. Data as a Service (DBaaS) model is utilized to oversee databases in cloud setting. Secure DBaaS standard gives data classification to distributed storage. Secure DBaaS is expected to allow various and independent buyers to append to the cloud while not middle server. Documents, data structures and data square measure encoded before exchange to the cloud. Different cryptography methods square measure won't to change over plain content into scrambled data. Table names and their section names likewise are scrambled inside of the cloud data wellbeing subject. The framework underpins topographically conveyed buyers to append on to A scrambled cloud data. Amid this paper we tend to quadrangular measure proposing new plan that coordinate distributed storage administration with data protection and have a component of flogging cohappening operations on scrambled data and together with the topographically dispersed buyers to connect on to these cloud data that is encoded and that they conjointly given to execute their operations over the cloud data. This configuration disposes of the dealers (Intermediate intermediaries) it constrains the quantifiability, flexibility, availability. High touchy data square measure encoded by RSA cryptography and standard data square measure scrambled abuse AES method so overhead on the system will be decreased.
Authors and Affiliations
B. Mahalakshmi Rao| M.tech(Research scholar) in Dept computer science & engineering, kakinada institute of engineering & technology, korangi,AP,India, K. Ravi Kumar| Associate. Professor &HOD in Dept computer science & engineering, kakinada institute of engineering & technology for women,korangi,AP,India
In These days, it turn out to be an open concern to give superior security to web services. In this way, secure user authentication is the principal assignment in security frameworks. Generally, the vast majority of...
Closed Loop Fuzzy Logic Control of 3-∅ BLDC Motor Driven by High Voltage Gain Interleaved Boost Converter
This paper deals the Brush Less DC Motor (BLCDM) driven by an efficient closed loop fuzzy logic based high voltage gain interleaved boost converter. The proposed high voltage gain interleaved boost converter in this...
Power Quality Improvement For PV/Battery Hybrid System Using Fuzzy Logic Controlling Technique
power quality improvement for pv/battery hybrid system using fuzzy logic controlling technique has been presented this paper. The PV side cascaded boost DC-DC converter is controlled by P&O algorithm to extract the m...
Crowdsourcing: A New Approach Of Non-Domain Experts To Provide Predictive Behavioral Results
Bringing about models from great data sets and influential which subsets of data to mine is becoming more and more automated. Though preferring what data to gather in the first place necessitate human intuition or ex...
We introduce the Contributory Broadcast Encryption (ConBE) primitive, which is a half and half of GKA and BE. Contrasted with its preparatory Asiacrypt, this gives complete security proofs, outlines the need of the a...