News Updates Friday 26th Apr 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Supporting Security and Consistency for Distributed, Concurrent Access to Cloud Databases: A Review


Author : Shrikant Kale and Nitin R. Chopde

Pages : 3974-3977
Download PDF
Abstract

A cloud storage system consists of a group of storage servers over the web. The most aim is to produce secure storage services in a very cloud storage system. There square measure many totally different techniques were exist for storage services, whereas providing an information confidentiality solutions for the information as a service paradigm square measure still in operating and isn’t completed still. We tend to propose a unique design that integrates cloud information services with knowledge confidentiality and therefore the risk of corporal punishment synchronic operations on encrypted knowledge. Coding schemes square measure wont to give knowledge confidentiality, knowledge hardiness and practicality. We tend to use associate coding knowledge and Key verification for implementing for knowledge secure storage. The planned design has the additional advantage of eliminating intermediate proxies that limit the physical property, accessibility, and measurability properties that square measure intrinsic in cloud-based solutions. We tend to propose associate design for higher security and confidentiality of an information hold on within the cloud databases. The efficaciousness of the planned design is evaluated through theoretical analyses and intensive experimental results supported a paradigm implementation subject to the TPC-C customary benchmark for various numbers of shoppers within the network. Coding schemes square measure wont to give knowledge confidentiality, knowledge hardiness and practicality. We tend to use associate coding knowledge and Key verification for implementing for knowledge secure storage.

Keywords: Cloud, security, confidentiality, SecureDBaaS, database

Article published in International Journal of Current Engineering and Technology, Vol.4, No.6 (Dec-2014)

 

Call for Papers
  1. IJCET- March/April 2024 Issue

    Submission Last Date
    30 April 2024
  2. DOI is given to all articles
  3. Current Issue
  4. IJTT-March-2024
  5. IJAIE-March-2024
  6. IJCSB-March-2024
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved