• No results found

Cloud databases

Efficiency and fee evaluation of an adaptive encryption architecture for cloud databases

Efficiency and fee evaluation of an adaptive encryption architecture for cloud databases

... plain cloud database, because concurrent clients can issue parallel operations without passing through some centralized component as in alternative ...encrypted cloud databases are masked by network ...

6

Privacy Preserving Approach using Encrypted Cloud Databases

Privacy Preserving Approach using Encrypted Cloud Databases

... into cloud databases. All the data which is stored on the cloud provider are encrypted through cartographic algorithms which allow the execution of standard SQL queries on encrypted ...of ...

5

Analysis of Cloud Databases by Using Adaptive Encryption Algorithm

Analysis of Cloud Databases by Using Adaptive Encryption Algorithm

... The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality ...public cloud ...

5

A Review on Self-Determining Method to Encrypted Cloud Databases

A Review on Self-Determining Method to Encrypted Cloud Databases

... nearly to works utilizing encryption to secure information oversaw by untrusted databases. In such a case, a principle issue to address is that cryptographic strategies can't be naıvely connected to standard DBaaS ...

9

A Novel Approach to Access Encrypted Cloud Databases by Using Distributed and Concurrent Techniques

A Novel Approach to Access Encrypted Cloud Databases by Using Distributed and Concurrent Techniques

... The cloud database as a service is novel paradigms that can be support several Internet- based applications, its adoption requires the solution of the information confidentiality ...public cloud ...

5

NEED OF PRIVACY PRESERVATION IN CLOUD DATABASES

NEED OF PRIVACY PRESERVATION IN CLOUD DATABASES

... relational databases to today's cloud databases, the need to process the query efficiently while preserving the privacy had always been the ...in cloud, privacy preservation is of utmost ...

8

Permitting Distinctive Access Levels to Encrypted Cloud Databases

Permitting Distinctive Access Levels to Encrypted Cloud Databases

... typical cloud database ...the cloud database, and it is immediately applicable to existing cloud DBaaS, such as the experimented PostgreSQL Plus Cloud Database, Windows Azure, and ...

6

A Review On- Concurrent and Independent Access to Encrypted Cloud Databases

A Review On- Concurrent and Independent Access to Encrypted Cloud Databases

... integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted ...encrypted cloud database, and to execute concurrent and independent ...

5

Distributed, Concurrent, And Independent Access To Encrypted Cloud Databases

Distributed, Concurrent, And Independent Access To Encrypted Cloud Databases

... homomorphism encryption scheme. “Crypt: Protecting Confidentiality with Encrypted Query Processing” R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan [7], have described, Crypt is a system that provides ...

6

An Exploration of Concurrent, and Independent Access to Encrypted Cloud Databases

An Exploration of Concurrent, and Independent Access to Encrypted Cloud Databases

... the cloud database and it's right away relevant to present cloud ...plus cloud database, home windows Azure and ...a cloud database server to execute concurrent SQL operations (not simplest ...

6

Access Control Of Data Of The Users In Encrypted Cloud Databases

Access Control Of Data Of The Users In Encrypted Cloud Databases

... We have implemented a prototype of the IntTest system and tested it using the NCSU’s virtual computing lab a production cloud infrastructure operating in a similar way. We add portal nodes into VCL and deploy IBM ...

14

DISPERSED, CONCURRENT AND INDEPENDENT RIGHT OF ENTRY TO ENCRYPTED CLOUD DATABASES

DISPERSED, CONCURRENT AND INDEPENDENT RIGHT OF ENTRY TO ENCRYPTED CLOUD DATABASES

... a cloud context, wherever vital info is placed in infrastructures of untrusted third parties, making certain information confidentiality is of predominant ...embrace cloud suppliers, intermediaries, and ...

6

Effective Data Structure for Mining Frequent Itemset in Cloud Databases

Effective Data Structure for Mining Frequent Itemset in Cloud Databases

... 216 For example, in order to discover a frequent pattern of size 200, it needs to generate a candidate set of 2 200 . Hence the running time is high when compared to MFT algorithm. In FP-growth algorithm the drawback is ...

8

Trust DB Providing Confidentiality and Trust in Cloud Databases

Trust DB Providing Confidentiality and Trust in Cloud Databases

... software. Cloud computing is a highly resource provisioning and promising technology such that it helps in managing data as per ...CryptDB, Cloud, Confidentiality, Decryption, Encryption, Key, Queries ...

7

Preserving Data Confidentiality and Consistency at Encrypted Cloud Databases

Preserving Data Confidentiality and Consistency at Encrypted Cloud Databases

... requiring cloud users to know the location and other details of the computing ...integrate cloud database service with data confidentiality and the possibility of executing concurrent operations on ...

5

Research on Security Architecture in Mobile Cloud Computing to Prevent Adaptive Anomaly Attacks

Research on Security Architecture in Mobile Cloud Computing to Prevent Adaptive Anomaly Attacks

... mobile cloud computing, the cloud services layers are unable to detect the new types of failures in the mobile ...Mobile Cloud Anomaly Detection (MCAD) algorithm has been proven ...mobile ...

6

An Enhanced Keyword Search Retrieval Using Page Ranking over Differential Query Services

An Enhanced Keyword Search Retrieval Using Page Ranking over Differential Query Services

... of Cloud computing is increasing due to massive increase of user access to the cloud ...the cloud databases to fulfill their storage requirements where the cloud service providers need ...

5

Querying Over Encrypted Databases in a Cloud Environment

Querying Over Encrypted Databases in a Cloud Environment

... In this model, one central proxy server - owned by the data owner and residing on their network - processes all query encryptions and result set decryptions. This server could be queried by either connecting client ...

80

Distributed retrieval engine for the development of cloud-deployed biological databases

Distributed retrieval engine for the development of cloud-deployed biological databases

... the cloud-based database is managed using the persistence ...the cloud configuration settings, and a ...the cloud it is available for ‘ local ’ search by guest ...MongoDB cloud allows for a ...

10

Flexible   and  Publicly  Verifiable  Aggregation  Query  for  Outsourced  Databases  in  Cloud

Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud

... with simple hash operations. However, the communication complexity of ref. [7] is linear to the number of tuples and attributes associated with the query results, which limits its performance for queries results with ...

5

Show all 10000 documents...

Related subjects