EMPLOYING OF INNOVATIVE APPROACH FOR MANAGING OF DATA ON CLOUD SERVER

Naveen Yerramshetti

Abstract


Various methods are present for storage services, whereas solutions of data privacy for database service are not very effective. Many techniques were introduced in literatures that assure privacy to a certain limit by means of data distribution and by consideration of secret sharing. We make a study on protective database service that acts as major solution allowing cloud tenant to gain various features such as ease of understanding, dependability, and flexibility devoid of revealing of unencrypted data towards cloud provider. Various studies on basis of cloud platforms exhibit that protective database service is valid to any of the database systems as it does not modify services of cloud database. Our solution acts as leading solution that manages distributed clients for connecting towards an encrypted database, and for implementation of self-determining operations.


Keywords


Data privacy; Database service; Data distribution; Cloud provider; Storage services; Cloud database;

References


H. Hacigu¨mu¨ s¸, B. Iyer, and S. Mehrotra, “Providing Database as a Service,” Proc. 18th IEEE Int’l Conf. Data Eng., Feb. 2002.

C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” Proc. 41st Ann. ACM Symp. Theory of Computing May 2009.

R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processing,” Proc. 23rd ACM Symp. Operating Systems Principles,Oct. 2011.

“Oracle Advanced Security,” Oracle Corporation, http://www.oracle.com/ technet work/database/options/advanced-security,Apr. 2013.

G. Cattaneo, L. Catuogno, A.D. Sorbo, and P. Persiano, “The Design and Implementation of a Transparent Cryptographic File System for Unix,” Proc. FREENIX Track: 2001 USENIX Ann.Technical Conf., Apr. 2001.

E. Damiani, S.D.C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, “Balancing Confidentiality and Efficiency in Untrusted Relational Dbmss,” Proc. Tenth ACM Conf. Computer and Comm. Security, Oct. 2003.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.