Computational Analysis of Encrypted Database to Provide Confidentiality
Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of clou...
Gespeichert in:
Veröffentlicht in: | International Journal of Computer Theory and Engineering 2015-04, Vol.7 (2), p.108-112 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the concept of Network Security can be applied over the cloud network, where several encryption algorithms are applied to provide integrity on the data. Such algorithms include Symmetric encryptions, Asymmetric encryptions, Hashing algorithms and Digital signatures. Even though these algorithms provide security, however these are not applied on query based data retrieval from databases where certain queries are used to invoke the data. Till to date many researchers proposed several models to provide security to the data in database and are not upto the mark. Since the operations are done in database which is located remotely, away from user, providing encryption on queries and data together will make an efficient approach. Such mechanisms like Homomorphic encryption, Order-preserving encryption are examined and a novel approach is defined to meet all security issues over a cloud termed as "CryptDB". |
---|---|
ISSN: | 1793-8201 1793-8201 |
DOI: | 10.7763/IJCTE.2015.V7.940 |