CFP last date
22 April 2024
Reseach Article

Distributed Synchronized and Free Access to Encoded Cloud Databases

by S.palani, Y.prathiba, R.shobha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 1
Year of Publication: 2015
Authors: S.palani, Y.prathiba, R.shobha
10.5120/21668-4747

S.palani, Y.prathiba, R.shobha . Distributed Synchronized and Free Access to Encoded Cloud Databases. International Journal of Computer Applications. 122, 1 ( July 2015), 36-38. DOI=10.5120/21668-4747

@article{ 10.5120/21668-4747,
author = { S.palani, Y.prathiba, R.shobha },
title = { Distributed Synchronized and Free Access to Encoded Cloud Databases },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 1 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 36-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number1/21668-4747/ },
doi = { 10.5120/21668-4747 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:28.694036+05:30
%A S.palani
%A Y.prathiba
%A R.shobha
%T Distributed Synchronized and Free Access to Encoded Cloud Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 1
%P 36-38
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Setting basic information in the hands of a cloud supplier ought to accompany the surety of security and accessibility for evidence exact stagnant, now association, also organism recycled. A rarepossibilities exist for capacity administrations, while information secrecy answers for the database as an administration ideal model are still youthful. We propose a novel construction modeling that incorporates cloud database administrations with the information classifiedness and the likely hood of executing simultaneous operations on twisted evidence. This is the major organization assistant topographically disseminated customers to interface straight forwardly to an encoded cloud database, and to execute simultaneous and autonomous operations including those adjusting the record arrangement. The projected production modeling takes the further playing point of disposing of middle intermediaries that utmost the flexibility, accessibility, and adaptability properties that are inborn in cloud-based activities. The acceptability of the suggested important planning is assessed through hypothetical examinations and far reaching trial results taking into account a model usage subject to the TPC-C standard benchmark for distinctive quantities of customers and system latencies.

References
  1. M. Armbrust et al. , "A View of Cloud Computing," Comm. of the ACM, vol. 53, no. 4, pp. 50-58, 2010.
  2. W. Jansen and T. Grance, "Guidelines on Security and Privacy in Public Cloud Computing," Technical Report Special Publication 800-144, NIST, 2011.
  3. A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten, "SPORC: Group Collaboration Using Untrusted Cloud Resources," Proc. Ninth USENIX Conf. Operating Systems Design and Implementation, Oct. 2010.
  4. J. Li, M. Krohn, D. Mazie`res, and D. Shasha, "Secure Untrusted Data Repository (SUNDR)," Proc. Sixth USENIX Conf. Opearting Systems Design and Implementation, Oct. 2004.
  5. P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish, "Depot: Cloud Storage with Minimal Trust," ACM Trans. Computer Systems, vol. 29, no. 4, article 12, 2011.
  6. H. Hacigu¨mu¨ s¸, B. Iyer, and S. Mehrotra, "Providing Database as a Service," Proc. 18th IEEE Int'l Conf. Data Eng. , Feb. 2002.
  7. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. 41st Ann. ACM Symp. Theory of Computing, May 2009.
  8. R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: Protecting Confidentiality with Encrypted Query.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud providers Cloud services Distributed data Access control Data privacy Data security