SecureDBaaS Model for Accessing Encrypted Cloud Databases

1
P Jagadeeswaraiah
P Jagadeeswaraiah
2
M.R. Pavan Kumar
M.R. Pavan Kumar
1 SVNE

Send Message

To: Author

GJCST Volume 15 Issue B3

Article Fingerprint

ReserarchID

CSTBA9AD5

SecureDBaaS Model for Accessing Encrypted Cloud Databases Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Cloud computing has recently emerged being a compelling paradigm that pertains to managing and delivering services over the web. The particular prevalent problem connected with cloud is confidentiality, security, as well as reliability etc., in which how the cloud provider assures. To recognize this, a novel architecture is usually introduced that will integrates cloud database services and as well executing concurrent operations on encrypted information. Also a new homomorphic encryption algorithm will likely be incorporated to offer confidentiality as well as concurrent execution of various SQL operations. This will be the first option supporting quite a few distributed clienteles to access encrypted cloud databases. One of main thing is that it eliminates advanced proxies in between cloud user and provider. The performance on the architecture is usually calculated by means of theoretical and practical results which are subjected to TPC-C benchmark standard tools for a number of clients as well as network latencies.

7 Cites in Articles

References

  1. A Feldman,W Zeller,M Freedman,E Felten (2010). SPORC: Group Collaboration Using Untrusted Cloud Resources.
  2. L Ferretti,M Colajanni,M Marchetti (2012). Supporting Security and Consistency for Cloud Database.
  3. Corporate Transaction Processing Performance Council (2013). Complete TPC results (as of 9/30/91).
  4. H Hacigu¨mu¨ S¸,B Iyer,S Mehrotra (2002). Providing Database as a Service.
  5. Luca Ferretti,Michele Colajanni,Mirco Marchetti (2013). Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases.
  6. Jinyuan Li,Maxwell Krohn,David Mazieres,Dennis Shasha (2004). Secure Untrusted Data Repository (SUNDR).
  7. Tebaa Maha,E Saïd,Abdellatif Hajji,Ghazi (2015). Homomorphic Encryption Applied to the Cloud computing Securiy.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

P Jagadeeswaraiah. 2015. \u201cSecureDBaaS Model for Accessing Encrypted Cloud Databases\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 15 (GJCST Volume 15 Issue B3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-B Classification: H.2.4
Version of record

v1.2

Issue date

July 17, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8080
Total Downloads: 2084
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Cloud computing has recently emerged being a compelling paradigm that pertains to managing and delivering services over the web. The particular prevalent problem connected with cloud is confidentiality, security, as well as reliability etc., in which how the cloud provider assures. To recognize this, a novel architecture is usually introduced that will integrates cloud database services and as well executing concurrent operations on encrypted information. Also a new homomorphic encryption algorithm will likely be incorporated to offer confidentiality as well as concurrent execution of various SQL operations. This will be the first option supporting quite a few distributed clienteles to access encrypted cloud databases. One of main thing is that it eliminates advanced proxies in between cloud user and provider. The performance on the architecture is usually calculated by means of theoretical and practical results which are subjected to TPC-C benchmark standard tools for a number of clients as well as network latencies.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

SecureDBaaS Model for Accessing Encrypted Cloud Databases

P Jagadeeswaraiah
P Jagadeeswaraiah SVNE
M.R. Pavan Kumar
M.R. Pavan Kumar

Research Journals