Downloads: 109 | Views: 274
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.3 / 10
Concurrent and Free Accessing in Encrypted Cloud Databases
G. Sudheer Kumar, P. Pavan Kumar
Abstract: The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing. Cloud computing is one of the most increasing one with the increase number of cloud users. In todays environment every user wants to access their data at any time and at anywhere. In an organization they store their data only on their computers, if they want their data during roaming situation means it is not possible one to carry the data at every time, this is a difficult factors for an organization. Cloud computing can address this problem by providing data storage mechanism to access the data at anywhere. This is one of the storage device used to access their data at any where through networks which is called cloud provider. For this service user worry about the security and privacy issue under this cloud computing for their personal data. For this issue this survey shows various techniques for the security and privacy mechanism for the user data.
Keywords: Cloud, security, confidentiality, SecureDBaaS, database
Edition: Volume 4 Issue 12, December 2015
Pages: 1731 - 1735
DOI: https://www.doi.org/10.21275/NOV152030
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1875 - 1880Microclustering with Outlier Detection for DADC
Aswathy Priya M.