Confidentiality of Database for Secure Information in Cloud Computing Using Table Collide Storage Model

نویسنده

  • Lakshmi Priya
چکیده

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Since the data transmission on the internet or over any networks is vulnerable to attack, privacy preservation and data integrity have become two of the most critical security issues related to user data. In conventional paradigm, the organizations have the physical possession of their data and hence have an ease of implementing better data security policies. But in case of cloud computing, the data is stored on an autonomous business party, who provides data storage as a subscription service. The users have to trust the cloud service provider (CSP) for security of their data. Cloud database can be decomposed and placed in different service providers’ servers at cloud computing to secure data from any intruder. Here the challenge lies in security and also placing data at different locations including how, when and where to place in cloud storage to maintain confidentiality. This article describes tables collide storage model with private key table structure, which ensures confidentiality in cloud computing by splitting table into small pieces and implicitly performs encryption through collide different table’s pieces before storing in cloud environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

A RAID-Based Secure and Fault-Tolerant Model for Cloud Information Storage

Cloud computing allows for access to ubiquitous data storage and powerful computing resources through the use of web services. There are major concerns, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by introducing a novel security mechanism for secure and fault-tolerant cloud information storage. The information storage model f...

متن کامل

Essential Cloud Storage Systems Security Methodologies

The demand to have secure environments for systems’ information on cloud systems is arising since this should be more secure and far away from our systems damage disasters and data corruption. The dream became real with the cloud computing. Cloud computing is being more famous and used especially in the enterprises where the cost matters. These enterprises can reduce IT costs by using cloud com...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016