Secure query processing and optimization in cloud environment: a review

被引:0
作者
Divya, V. L. [1 ]
Job, P. A. [2 ]
Preetha, Mathew K. [1 ]
机构
[1] Cochin Univ, Coll Engn Kuttanadu, Dept Comp Sci, Pulincunnu 688504, Kerala, India
[2] Cochin Univ, Coll Engn Kuttanadu, Dept Mech Engn, Pulincunnu, Kerala, India
来源
INFORMATION SECURITY JOURNAL | 2024年 / 33卷 / 02期
关键词
Cloud computing; deterministic query optimization; query optimization; query plan; query processing; DATA REPLICATION; SCHEME; AVAILABILITY; INTEGRITY; STRATEGY; PRIVACY; SYSTEM;
D O I
10.1080/19393555.2023.2270976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is trusted and used by millions of users around the world. Therefore, it becomes essential to offer trusted and efficient services to its users. Query processing and query optimization are the major components to provide optimal query plans for users through different steps. So far, the mathematical evaluation including algebraic transformation and selectivity estimation models are performed to improve the security while optimization and processing of query. Meanwhile, they have several equivalence rules to have various logical form. That problem was stated by single query processing at a time, but they are not efficient for dynamic operation of cloud since they are slower. Hence, this paper presents a review of improvement made to the processing and optimization of queries with the security enhancement in the past 8 years neglecting the tedious mathematical procedures. Along with the query processing techniques, the quantitative analysis of those techniques is provided in the paper based on deterministic and non-deterministic query processing techniques. As a result, it is found that when utilizing multiple query processing techniques, the host system may get loaded and struck, while the adaptive model works better by providing the process to host system based on its processing capability.
引用
收藏
页码:172 / 191
页数:20
相关论文
共 89 条
[21]   Robust heuristic algorithms for exploiting the common tasks of relational cloud database queries [J].
Dokeroglu, Tansel ;
Bayir, Murat Ali ;
Cosar, Ahmet .
APPLIED SOFT COMPUTING, 2015, 30 :72-82
[22]   Evolutionary Multiobjective Query Workload Optimization of Cloud Data Warehouses [J].
Dokeroglu, Tansel ;
Sert, Seyyit Alper ;
Cinar, Muhammet Serkan .
SCIENTIFIC WORLD JOURNAL, 2014,
[23]  
Dwivedi S., 2017, AM J ENG RES, V6, P36
[24]   Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing [J].
El Makkaoui, Khalid ;
Beni-Hssane, Abderrahim ;
Ezzati, Abdellah .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (12) :4629-4640
[25]   A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing [J].
El Makkaoui, Khalid ;
Ezzati, Abdellah ;
Beni-Hssane, Abderrahim ;
Ouhmad, Slimane .
15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 :83-90
[26]  
Gaetani E., 2017, P 1 IT C CYB ITASEC1, V1816
[27]   Efficient distance join query processing in distributed spatial data management systems [J].
Garcia-Garcia, Francisco ;
Corral, Antonio ;
Iribarne, Luis ;
Vassilakopoulos, Michael ;
Manolopoulos, Yannis .
INFORMATION SCIENCES, 2020, 512 :985-1008
[28]   LSShare: an efficient multiple query optimization system in the cloud [J].
Ge, Xing ;
Yao, Bin ;
Guo, Minyi ;
Xu, Changliang ;
Zhou, Jingyu ;
Wu, Chentao ;
Xue, Guangtao .
DISTRIBUTED AND PARALLEL DATABASES, 2014, 32 (04) :583-605
[29]  
GEETHA R, 2017, INT CONF ADVAN COMPU, P1
[30]  
Hiremath S, 2017, 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), P306