IMPLEMENTATION OF AN EFFECTIVE APPROACH FOR DATA PRIVACY WITH IN CLOUD SYSTEM

T. Neetha

Abstract


Organizing of important data by the cloud provider should give assurance of protecting and accessing of the data in any situation.  We employ an approach that assures confidentiality of data that is stored within databases of public cloud. There are various methods that make sure of protection for storage service while promising of privacy in database as a service is considered as an important research area till now. It is compatible with satisfactory database servers and is related to various database functioning since the entire adopted solutions are database agnostic. The design makes it associated to works that makes uses encryption to defend data that is managed by databases that are not trustable. It put together conventional methods of cryptography schemes, as well as new methods for managing of encrypted metadata on the cloud database that is not trustable.  This approach incorporates services of cloud database by means of data privacy and implements synchronized operations on encrypted information.  


Keywords


Cryptography Schemes; Encrypted; Cloud Database; Storage Service

References


. C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” Proc. 41st Ann. ACM Symp. Theory of Computing, May 2009.

. R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processing,” Proc. 23rd ACM Symp. Operating Systems Principles, Oct. 2011.

. H. Hacigu¨mu¨ s¸, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,” Proc. ACM SIGMOD Int’l Conf. Management Data, June 2002.

. M. Hadavi, E. Damiani, R. Jalili, S. Cimato, and Z. Ganjei, “AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing,” Proc. Fifth Int’l Workshop Autonomous and Spontaneous Security, Sept. 2013.

. G. Cattaneo, L. Catuogno, A.D. Sorbo, and P. Persiano, “The Design and Implementation of a Transparent Cryptographic File System For Unix,” Proc. FREENIX Track: 2001 USENIX Ann. Technical Conf., Apr. 2001.

. H. Berenson, P. Bernstein, J. Gray, J. Melton, E. O’Neil, and P. O’Neil, “A Critique of Ansi Sql Isolation Levels,” Proc. ACM SIGMOD, June 1995.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.