Scattered simultaneous and autonomous access to scrambled cloud databases

B Mahalakshmi Rao, K Ravi Kumar

Abstract


Cloud data environments square measure unpleasantly tempting for the preparing of tremendous scale applications owing to their amazingly ascendible and offered foundation. Data as a Service (DBaaS) model is utilized to oversee databases in cloud setting. Secure DBaaS standard gives data classification to distributed storage. Secure DBaaS is expected to allow various and independent buyers to append to the cloud while not middle server. Documents, data structures and data square measure encoded before exchange to the cloud. Different cryptography methods square measure won't to change over plain content into scrambled data. Table names and their section names likewise are scrambled inside of the cloud data wellbeing subject. The framework underpins topographically conveyed buyers to append on to A scrambled cloud data. Amid this paper we tend to quadrangular measure proposing new plan that coordinate distributed storage administration with data protection and have a component of flogging co-happening operations on scrambled data and together with the topographically dispersed buyers to connect on to these cloud data that is encoded and that they conjointly given to execute their operations over the cloud data. This configuration disposes of the dealers (Intermediate intermediaries) it constrains the quantifiability, flexibility, availability. High touchy data square measure encoded by RSA cryptography and standard data square measure scrambled abuse AES method so overhead on the system will be decreased

Keywords


Cloud, security, confidentiality, SecureDBaaS, database.

References


Homomorphic Encryption Using Ideal Lattices,‖ Proc. 41st Ann. ACM Symp. Theory of Computing, May 2009.

R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, ―CryptDB: Protecting Confidentiality with Encrypted Query Processing,‖ Proc. 23rd ACM Symp. Operating Systems Principles, Oct. 2011.

H. Hacigu¨mu¨ s¸, B. Iyer, C. Li, and S. Mehrotra, ―Executing SQL over Encrypted Data in the Database-Service-Provider Model,‖ Proc. ACM SIGMOD Int’l Conf. Management Data, June 2002.

J. Li and E. Omiecinski, ―Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases,‖ Proc. 19th Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, Aug. 2005.

E. Mykletun and G. Tsudik, ―Aggregation Queries in the Database-as-a-Service Model,‖ Proc. 20th Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, July/Aug. 2006.

D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally, ―Database Management as a Service: Challenges and Opportunities,‖ Proc. 25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009.

V. Ganapathy, D. Thomas, T. Feder, H. GarciaMolina, and R. Motwani, ―Distributing Data for Secure Database Services,‖ Proc. Fourth ACM Int’l Workshop Privacy and Anonymity in the Information.

A. Shamir, ―How to Share a Secret,‖ Comm. of the ACM, vol. 22, no. 11, pp. 612-613, 1979.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.