Data Asset by Query Processing In Client and Server

被引:0
作者
Prasanna, E. [1 ]
Gunasekaran, G. [2 ]
机构
[1] St Peters Univ, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Meenakshi Coll Engn, Chennai, Tamil Nadu, India
来源
2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2016年
关键词
Cloud Computing; Cloud Storage; Privacy; Privacy-Preserving;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet usage has increased largely due to this the data has to be very largely stored in the database. Cloud computing is the latest model for storing large amount of data. As a reason administration of the data has so much of complexity. Due to this security of the complex data has to be in demand for the privacy of the data. In the field of data outsourcing cloud computing has turned into a moderate innovation for outsourcing information. This will help people and associations to have plenty advantages, for example, stockpiling, stage, programming and different administrations. Notwithstanding the focal points, the cloud clients have security issues as the cloud server is considered "untrusted". In this paper we propose and construct a security system that gives complete security to outsourced information. We considered a situation where three groups are included. They are cloud server, information proprietors and trusted customers. The information proprietors store and recover information. The cloud server is implied for putting away outsourced information. The trusted customer gets information of information proprietors from server by making similarity index inquiries. We constructed different systems that assistance in secure storage recovery and questioning of outsourced information. At the point when information is sent to cloud, it is changed and encoded before putting away into server. This will be decoded when inquiries are made by trusted customers. We propose a model application that demonstrates the convenience of the proposed system and the experimental results are empowering.
引用
收藏
页数:4
相关论文
共 27 条
  • [21] Wang C., 2010, P IEEE INFOCOM 10
  • [22] Wang C., 2010, P ICDCS
  • [23] Wang C, 2010, INT CON DISTR COMP S, DOI 10.1109/ICDCS.2010.34
  • [24] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [25] A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata
    Waqar, Adeela
    Raza, Asad
    Abbas, Haider
    Khan, Muhammad Khurram
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 235 - 248
  • [26] Outsourced Similarity Search on Metric Data Assets
    Yiu, Man Lung
    Assent, Ira
    Jensen, Christian S.
    Kalnis, Panos
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (02) : 338 - 352
  • [27] Yu C. - M., SYSTEMS J IEEE, P1