International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 274

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.3 / 10


     

Concurrent and Free Accessing in Encrypted Cloud Databases

G. Sudheer Kumar, P. Pavan Kumar


Abstract: The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing. Cloud computing is one of the most increasing one with the increase number of cloud users. In todays environment every user wants to access their data at any time and at anywhere. In an organization they store their data only on their computers, if they want their data during roaming situation means it is not possible one to carry the data at every time, this is a difficult factors for an organization. Cloud computing can address this problem by providing data storage mechanism to access the data at anywhere. This is one of the storage device used to access their data at any where through networks which is called cloud provider. For this service user worry about the security and privacy issue under this cloud computing for their personal data. For this issue this survey shows various techniques for the security and privacy mechanism for the user data.


Keywords: Cloud, security, confidentiality, SecureDBaaS, database


Edition: Volume 4 Issue 12, December 2015


Pages: 1731 - 1735


DOI: https://www.doi.org/10.21275/NOV152030



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
G. Sudheer Kumar, P. Pavan Kumar, "Concurrent and Free Accessing in Encrypted Cloud Databases", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 1731-1735, https://www.ijsr.net/getabstract.php?paperid=NOV152030, DOI: https://www.doi.org/10.21275/NOV152030



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1875 - 1880

Microclustering with Outlier Detection for DADC

Aswathy Priya M.

Share this Article



Top