SecureDBaaS Model for Accessing Encrypted Cloud Databases

Article ID

CSTBA9AD5

SecureDBaaS Model for Accessing Encrypted Cloud Databases

P Jagadeeswaraiah
P Jagadeeswaraiah SVNE
M.R. Pavan Kumar
M.R. Pavan Kumar
DOI

Abstract

Cloud computing has recently emerged being a compelling paradigm that pertains to managing and delivering services over the web. The particular prevalent problem connected with cloud is confidentiality, security, as well as reliability etc., in which how the cloud provider assures. To recognize this, a novel architecture is usually introduced that will integrates cloud database services and as well executing concurrent operations on encrypted information. Also a new homomorphic encryption algorithm will likely be incorporated to offer confidentiality as well as concurrent execution of various SQL operations. This will be the first option supporting quite a few stributed clienteles to access encrypted cloud databases. One of main thing is that it eliminates advanced proxies in between cloud user and provider. The performance on the architecture is usually lculated by means of theoretical and practical results which are subjected to TPC-C benchmark standard tools for a number of clients as well as network latencies.

SecureDBaaS Model for Accessing Encrypted Cloud Databases

Cloud computing has recently emerged being a compelling paradigm that pertains to managing and delivering services over the web. The particular prevalent problem connected with cloud is confidentiality, security, as well as reliability etc., in which how the cloud provider assures. To recognize this, a novel architecture is usually introduced that will integrates cloud database services and as well executing concurrent operations on encrypted information. Also a new homomorphic encryption algorithm will likely be incorporated to offer confidentiality as well as concurrent execution of various SQL operations. This will be the first option supporting quite a few stributed clienteles to access encrypted cloud databases. One of main thing is that it eliminates advanced proxies in between cloud user and provider. The performance on the architecture is usually lculated by means of theoretical and practical results which are subjected to TPC-C benchmark standard tools for a number of clients as well as network latencies.

P Jagadeeswaraiah
P Jagadeeswaraiah SVNE
M.R. Pavan Kumar
M.R. Pavan Kumar

No Figures found in article.

P Jagadeeswaraiah. 2015. “. Global Journal of Computer Science and Technology – B: Cloud & Distributed GJCST-B Volume 15 (GJCST Volume 15 Issue B3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
GJCST-B Classification: H.2.4
Keywords
Article Matrices
Total Views: 8033
Total Downloads: 2131
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

SecureDBaaS Model for Accessing Encrypted Cloud Databases

P Jagadeeswaraiah
P Jagadeeswaraiah SVNE
M.R. Pavan Kumar
M.R. Pavan Kumar

Research Journals