Downloads: 116 | Views: 289
Survey Paper | Information Technology | India | Volume 4 Issue 1, January 2015 | Popularity: 6.4 / 10
Survey on: Query Services in Cloud Security
Sapana S. Vasave, Dr. Kishor R. Kolhe
Abstract: Now-a-days Cloud computing is become more popular as cloud infrastructure for storing the data. Data owners are stored their data in public cloud for the flexibility and cost-saving. In data privacy protection, before saving sensitive data it is encrypted. User trust, privacy and security are more concerns. Most frequently used queries for online data analytic is the range query. Consumer-centric cloud computing is used for development of smart electronic devices combined with the cloud computing technologies. Different cloud services are provided to the customers with the premise that an effective and efficient cloud search service is provided. Locality-sensitive hashing is provided the approximate queries that to distributed data servers which give problem of the imbalanced load and space inefficiency, in which limits the query accuracy and incurs long query latency between users and cloud servers. This type of query services could be expensive for data owner. More incremented services computing and cloud computing, it is possible to outsource large databases to database service providers and the providers maintain the range-query service. Using outsourced services, the data owner can reduce the cost of storing data in cloud infrastructure. Cloud computing providing reliable, customized, and guaranteed computing dynamic environment for end users.
Keywords: Cloud computing security, search, Multidimensional Range Query, Random Space Encryption, consumer-centric cloud, Hybrid storage systems, and approximate queries
Edition: Volume 4 Issue 1, January 2015
Pages: 1570 - 1572
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 136
Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015
Pages: 24 - 27An Approach for Canny Edge Detection Algorithm on Face Recognition
A. D. Chitra, Dr. P. Ponmuthuramalingam
Downloads: 0
Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024
Pages: 658 - 660Systematic Selection of Antipsychotics in Schizophrenia: A Binary Search Approach Based on Efficacy and Side Effects
Kunal Dhanda, Sweta Sehrawat
Downloads: 0
Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024
Pages: 661 - 664Revolutionizing Public Health: A Blockchain - Based System for Secure Genetic and Medical Data Management
Kunal Dhanda, Sweta Sehrawat
Downloads: 0
Review Papers, Information Technology, United States of America, Volume 13 Issue 6, June 2024
Pages: 1741 - 1747Risk Management and Compliance with Business Intelligence in Banking
Pranay Mungara
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 9, September 2022
Pages: 1279 - 1283Mastering Git: A Comprehensive Guide to Version Control for DevOps Engineers
Nagaraju Islavath