Data Asset by Query Processing In Client and Server

被引:0
作者
Prasanna, E. [1 ]
Gunasekaran, G. [2 ]
机构
[1] St Peters Univ, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Meenakshi Coll Engn, Chennai, Tamil Nadu, India
来源
2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2016年
关键词
Cloud Computing; Cloud Storage; Privacy; Privacy-Preserving;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet usage has increased largely due to this the data has to be very largely stored in the database. Cloud computing is the latest model for storing large amount of data. As a reason administration of the data has so much of complexity. Due to this security of the complex data has to be in demand for the privacy of the data. In the field of data outsourcing cloud computing has turned into a moderate innovation for outsourcing information. This will help people and associations to have plenty advantages, for example, stockpiling, stage, programming and different administrations. Notwithstanding the focal points, the cloud clients have security issues as the cloud server is considered "untrusted". In this paper we propose and construct a security system that gives complete security to outsourced information. We considered a situation where three groups are included. They are cloud server, information proprietors and trusted customers. The information proprietors store and recover information. The cloud server is implied for putting away outsourced information. The trusted customer gets information of information proprietors from server by making similarity index inquiries. We constructed different systems that assistance in secure storage recovery and questioning of outsourced information. At the point when information is sent to cloud, it is changed and encoded before putting away into server. This will be decoded when inquiries are made by trusted customers. We propose a model application that demonstrates the convenience of the proposed system and the experimental results are empowering.
引用
收藏
页数:4
相关论文
共 27 条
  • [1] AlSudiari M., 2012, Advanced Computing, V3, P159
  • [2] [Anonymous], 2009, SEC GUID CRIT AR FOC
  • [3] [Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
  • [4] [Anonymous], 2009, P ESORICS 09 SAINT M
  • [5] Balduzzi M., 2012, SAC SAC 2012 COMPUTE
  • [6] Bugiel S, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P389
  • [7] Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
  • [8] A privacy preserving authorisation system for the cloud
    Chadwick, David W.
    Fatema, Kaniz
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1359 - 1373
  • [9] Effective proximity retrieval by ordering permutations
    Chavez, Edgar
    Figueroa, Karina
    Navarro, Gonzalo
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2008, 30 (09) : 1647 - 1658
  • [10] Evfimevski A., 2003, P ACM SIMOD PODS C S