Secure and Efficient Data Storage in Multi-clouds
|
|
|
- Angelina Francis
- 10 years ago
- Views:
Transcription
1 International Journal of Information and Computation Technology. ISSN Volume 3, Number 9 (2013), pp International Research Publications House irphouse.com /ijict.htm Secure and Efficient Data Storage in Multi-clouds CSE, University College of Engineering, Rajasthan Technical University, Kota, Rajasthan, India. Abstract Any information is valuable as long as it has related data. If related data are not put together, the information is meaningless as unrelated data has no value. The mapped information is required only by authenticated users. So there is no necessity to store related information together. If the relations of a database are fragmented into chunks and these chunks are stored at different cloud service providers who provide Database as a Service then it could prevent from any privacy breach and the data stored will be secure. It would also reduce the data transfer costs as the entire data is not always required, for e.g. during updates queries. Also, instead of storage of chunks at a single CSP, if each chunk or fragment is stored at multiple CSPs it ensures availability and also permits concurrent access. Additionally, it would prevent financial loss during cloud outages and also prevent data lockin. Replicating data chunks at multiple clouds situated at geographically different locations would also have an additional decrease in response time. Keywords: Multi cloud; security; privacy constraints; Horizontal Fragmentation; Vertical fragmentation; availability; DBaaS. 1. Introduction Relational database management systems (RDBMSs) are an integral and indispensable component in most computing environments today, and their importance is unlikely to diminish [1]. With the advent of hosted cloud computing and storage, the opportunity to offer a DBMS as an outsourced service is gaining momentum, as witnessed by [2] Amazon s RDS, Microsoft s SQL Azure, Rackspace s Cloud Databases, Google
2 978 Compute Engine s Google Cloud SQL, StormDB s StormDB Database, SalesForce s Database.com and Savvis s Symphony. Such a database-as-a-service (DBaaS) is attractive for two reasons. First, due to economies of scale, the hardware and energy costs incurred by users are likely to be much lower when they are paying for a share of a service rather than running everything themselves. Second, the costs incurred in a well-designed DBaaS will be proportional to actual usage ( pay-per-use ) this applies to both software licensing and administrative costs. The latter are often a significant expense because of the specialized expertise required to extract good performance from commodity DBMSs. By centralizing and automating many database management tasks, a DBaaS can substantially reduce operational costs and perform well. Since CSPs are separate market entities, data integrity and privacy issues are the more critical ones that need to be addressed. Even though CSPs have standard regulations and powerful infrastructure to ensure data privacy and provide better availability, the reports on privacy breach and service outage have been apparent in the last few years. Also the political influence might become an issue with the availability of services. From the customer s point of view, relying on solo CSP is not very promising. Client privacy is a tentative issue as all clients do not have the same demand regarding privacy. Some are satisfied with the current policy while others are concerned about their privacy. The proposed system is designed preferably for the clients belonging to the second category for whom privacy is a great concern. The client may not afford the luxury of maintaining private data storage, while they are interested in spending a little more money on maintaining their privacy and availability. Especially companies dealing with financial, educational, health, legal, banking are prominent targets and leaking information of such companies can do significant harm to customers and may sometimes lead to national catastrophe. The proposed approach will provide the cloud computing users with a decision model that provides better security by distributing data over multiple CSP s in such a way that none of the CSPs can successfully retrieve meaningful information from the data pieces allocated to their servers. Also, it provides the user with better assurance of availability of data by maintaining redundancy in data distribution. In this case, if the service provider suffers a service outage or goes bankrupt, the users still can access his data by retrieving it from another CSP. 2. Related Works Carlo Curino, Evan Jones,Yang Zhang, Eugene Wu in [3] Relational Cloud: The Case for a Database Service in order to allow workloads to scale across multiple computing nodes, divide data into partitions that maximize transaction/query performance. They have developed a new graph-based data partitioning algorithm for transaction-oriented workloads that groups data items according to their frequency of co-access within transactions/queries.
3 Secure and Efficient Data Storage in Multi-clouds 979 G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu in [4] Two Can Keep a Secret: A Distributed Architecture for Secure Database Services perform efficient partitioning of data using privacy constraints on distributed database. Subashini, S. and V. Kavitha in [5] A Metadata Based Storage Model for Securing Data in Cloud Environm-ent in order to eliminate the disadvantage of storing all data of a client to the same provider, split data into chunks and distribute them among multiple cloud providers. Ms. P. R. Bhuyar, Dr. A.D. Gawande, Prof. A.B.Deshmukh in [6] Horizontal Fragmentation Techniques in Distributed Database fragment a relation horizontally according to locality of precedence of its attributes. Himel Dev, Tanmoy Sen, Madhusudan Basak and Mohammed Eunus Ali in [7] An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks inside the Cloud Data Distributor provide each chunk a unique virtual id and this id is used to identify the chunk within the Cloud Data Distributor and Cloud Providers. This virtualization conceals the identity of a client from the provider. 3. Data Storage Unit File as a unit of storage. Replications of the entire file at multiple CSP s is beneficial if the file does not contain sensitive data and the queries require all the data. If the file is stored at only one CSP and is not replicated at more than one CSP, a single CSP will get a high volume of remote data accesses. Storing at multiple CSP ensures the availability of data as well as permits concurrent access. Chunks of file as a unit of storage. Users require only a subset or a fragment of a file and the locality of access is defined on those fragments. Chunk storage permits a number of users to execute concurrently since the users will access different portions of a file. Parallel execution of a single query is also possible. Fragments of a file is usually the appropriate unit of storage. They aim to improve security, reliability, storage costs, update costs and communication costs. If the data in the file falls under the category Normal and the queries do not require all the data, chunk storage of data can be considered, where the data can be fragmented depending on the type or queries to be executed be it Horizontal or Vertical or Hybrid fragmentation. But if the data to be stored is Sensitive, then simple Horizontal, Vertical or Hybrid fragmentation would not provide the required security of data. 4. Data Storage Model Consider the data is stored at a single Cloud Database as a Service provider. Then there is a single point of failure which will affect data availability. Availability is also an important issue if he runs out of business. Cloud service customers cannot rely on single CSP to ensure storage of vital data. If the database is stored at two DBaaS
4 980 providers, there are chances that the two CSPs can act together secretly to achieve a fraudulent purpose and exchange the part of the data with each other and reconstruct the whole data. In our approach, the client does not have to trust the administrators of any cloud service providers to guarantee privacy. So long as an adversary does not gain access to all the data, data privacy is fully protected. If the client were to obtain database services from different vendors, the chances of an adversary breaking into all the service providers, is greatly reduced. Furthermore, the insider attacks at any one of the cloud service providers do not compromise the security of the system as a whole. If database security is taken care of by the customer, it also helps the cloud service provider by limiting their liability in case of break-ins into their system. If the service provider is not able to find any valuable information from the contents of the database, nor will the outsider. Existing proposals for secure database service are based on encryption. Although, these attempts are good at securing data in the cloud, they cause large overheads in query processing. Weak encryption algorithms that allow efficient queries leak far too much information and thus do not preserve privacy. On the other hand strong encryption algorithms often necessitate resorting to Plan A for queries, fetching the entire database from the servers which is simply too expensive. Despite increasing processor speeds encryption and decryption are not exactly cheap. New approach is to allow the client to partition its data across three or more logically independent cloud storage systems. 5. Data Privacy Each file has a privacy level: Normal, Sensitive or Critical [5]. The data which has low value to cloud service providers or attackers and can be allowed to be stored as public data is considered as Normal. The data which is having high value is considered as Critical and the data which has value when mapped with other data is considered as Sensitive. The data which maps Sensitive or Critical data to Normal data is also considered as Sensitive. The steps to ensure data privacy consists of Categorization, Fragmentation, Distribution, and Replication. Categorize user data as Normal, Sensitive or Critical. Split user data into chunks based on the categorization and provide these chunks to CSPs providing Database as a Service. Fragmentation of data is performed in such a fashion so as to ensure that the exposure of the contents of anyone database does not result in a violation of privacy. The presence of three or more cloud service providers enable efficient semantic attribute decomposition, or attribute encoding of sensitive attributes. For example, we can store telephone number by segregating area code at one CSP and telephone number at another CSP. The presence of multiple cloud service providers also enable the storage of many attribute values in unencrypted form. Typically the exposure of a set of attribute values corresponding to a tuple may result in privacy violation while the exposure of only some subsets of it may be harmless. For example individual s name and his credit card number may be a serious privacy
5 Secure and Efficient Data Storage in Multi-clouds 981 violation. However, exposing the name alone or the credit card number alone may not be a big deal. In such cases we may place individual s name in one CSP while storing his credit card number in another avoiding having to encrypt either attribute. A consequence is that queries involving both names and credit card number may be executed far more efficiently than if the attributes had been encrypted. Distribution is done according to the sensitivity of data and the reliability of CSP. Reliability is defined in terms of reputation and reliability of the CSP. Distribution restricts an attacker from having access to sufficient number of chunks of data and thus prevents successful extraction of valuable information. 6. Architecture Architecture as shown in Figure 1. consists of trusted client as well as three or more cloud service providers that provide Database as a Service. The Database as a Service providers provide reliable content storage and data management but are not trusted by the clients to preserve content privacy. The client does not store any persistent data but stores a mapping table describing the storage of various fragments location, their names etc. However the client has access to cheap hardware providing processing power as well as temporary storage and functionality in terms of offering a DBMS frontend, reformulating and optimizing queries and post processing query results, all of which are fairly cheap and can be performed using inexpensive hardware. The client executes queries by transmitting appropriate sub queries to each database and then piecing together the result obtained from the Cloud service providers at the client side. Figure 1: Multi Cloud Storage Architecture. 7. Relational Decomposition Data Fragmentation and Distribution among multiple CSPs is performed for ensuring security and availability of data in cloud. There are different techniques to partition a relation R A, A, A,... A ). Traditional decomposition methods are Horizontal, ( 1, 2 3 n
6 982 Vertical and Hybrid Fragmentation [7]. Horizontal Fragmentation partitions a relation along tuples. Vertical Fragmentation partitions a relation along attributes and a Mixed/Hybrid Fragmentation is a combination of Horizontal and Vertical Fragmentations. The fragments should be constructed such that they fulfill Completeness, Reconstruction and Disjointness properties. Horizontal fragmentation is done based on the selection conditions in the queries to reduce the amount of data during transfers. Horizontal fragmentation has limited use in enabling privacy preserving but it can be of great use in reducing communication costs. Whenever Reads or Writes or Delete operations are performed, they are not always on the entire relation. Horizontal fragmentation is done according to the workload behavior of the queries. Vertical fragmentation requires key attributes to be present in the sub relations. Key attributes may themselves be sensitive information. A single attribute may become a privacy constraint. In that case, it cannot be stored in open. It can be stored either by encoding the attribute or by storing the hash of the attribute, or by performing semantic attribute decomposition [4]. If it is a primary key attribute, in such a case, introduce a unique tuple ID. We can generate random numbers as tupleids ensuring that tupleids not already exist. Vertical fragmentation may require semantic attribute decomposition where an attribute A is split into two attributes A 1 and A 2. Attribute A 1 is stored in one of the sub relation and attribute A 2 is stored in another. For example while storing credit card number issuer identification number is stored in one of the sub relation and individual account identifier and check digit is stored other. Semantic Attribute decomposition will also benefit selection queries based on individual account number or queries that perform aggregation when grouping by issuer identification number could benefit greatly from A 2 attribute. In absence of A 2, if credit card numbers were encrypted, query processing becomes more expensive. Attribute encoding can also be used for attributes that need to be kept private. For e.g. salary. Encode salary s as s 1 and s 2 where s1 s r and s2 r. Store s1 and s2 in separate sub relations. 7.1 Specifying the Privacy Constraints Privacy requirements on a relational schema R are specified as a set or privacy constraints[4]. Each privacy constraint is listed as a set of attributes which alone or together may have some value. The decomposition of relation R should be such that for each privacy constraint on a relational schema R, all the attributes of a privacy constraint should not be a part of any sub relational schema. Some of the attributes of a constraint may be open, some may be encoded and some may be semantically decomposed but all the attributes of a privacy constraint cannot be together in any sub relation schema. Consider a database in a bank consisting of user information along side with the credit card information. A Customer Table {CustomerId (Primary Key (PK)), CustomerName, CustomerAddress, CustomerPhone, CustomerDOB}
7 Secure and Efficient Data Storage in Multi-clouds 983 A Membership Table {CustomerId (Primary & Foreign Key (FK) ), Pwd, PwdQuestion, PwdAnswer} Identify the privacy constraints on each table and then perform vertical fragmentation. 1) Customer table Constraints a) {CustomerPhone} is a sensitive information. b) {CustomerName and CustomerAddress}, {CustomerName and CustomerDOB} c) {CustomerAddress, CustomerPhone,Customer DOB} CustomerPhone is a single privacy constraint and cannot be stored in clear. So it can be stored by semantically decomposing it into Area Code and Telephone number. The constraints specified in (b) and (c)can be addressed by vertical fragmentation of attributes. R 1( CustomerId, CustomerName), R 2 ( Customer Id, CustomerAddress, CustomerTelephoneAreaCode), R 3 (CustomerId, Customer TelephoneNo, CustomerDOB). 2) Membership table Constraints a) {Pwd} is a sensitive attribute. b) {PwdQuestion, PwdAnswer} This table alone has no importance. But if the two cloud service providers collude, it has juicy information. So classify it as sensitive. Password is a sensitive attribute and cannot be stored in open. So store the hash value of the password. The constraints specified in (b) can be addressed by vertical fragmentation of attributes. R1 (CustomerId, Pwd#, PwdQuestion), R 2 (CustomerId, Pwd#,PwdAnswer). 8. Approach Distribution and Replication. Cloud providers focus on delivering 3 Nines. This availability alone is not enough to meet SLAs of enterprise customers. High end applications require 4 Nines availability. In order to ensure this high availability, after decomposition the client reformulates the queries and then replicates each decomposed relation (chunk) to at least two CSPs. Replication of each chunk is done at more than one cloud service provider so as to increase cloud availability from 3 nines i.e % to at least 4 nines i.e %. If one of the chunk Storage Provider goes down, the other chunk Storage Provider will provide the data chunks that were stored on the failed server. The client also maintains a mapping table of the various relations, chunks names, sequence of chunks and storage locations. Each chunk is given a random name. So even if the CSPs collude with each other and exchange the part of the data with each other, they cannot reconstruct the whole data. Even if the adversary is able to find out some information from all the chunks, he is not aware of the proper order of the chunks in making the information have some value. So the data will be secure. Splitting data into smaller chunks restricts data mining attacks also to a great extent as they contain insufficient amount of data.
8 Conclusion In this paper we have used categorization, fragmentation, distribution and replication techniques to ensure secure and efficient storage in clouds. Data fragmentation uses privacy constraints fragmentation along with horizontal and vertical fragmentation so that any information if in any case becomes available to either the Cloud Database as a Service Provider or to any outsider is of no value. So the data stored is secured. Also the data chunks are replicated at more than one service providers so as to ensure availability, allow concurrent access, restricts data mining attacks and reduce data transfer cost. References [1] MultiTenancy and Database as a Service (DBaaS) with ScaleArc Id. [Online] wordpress /wp-content /uploads/2013/01/scalearc_idb_whitepaper_multi_tenancy_and_dbaas.p df [2] 10 of the most useful cloud databases html [3] Carlo Curino, Evan P. C. Jones, Raluca Ada Popa, Nirmesh Malviya, Eugene Wu, Sam Madden, Hari Balakrishnan, Nickolai Zeldovich Relational Cloud: The Case for a Database Service in Proceedings of 5th Biennial Conference on Innovative Data Systems Research, Asilomar, CA, January [4] G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu Two Can Keep a Secret: A Distributed Architecture for Secure Database Services in Proceedings of Innovative Data Systems Research Conference, [5] Subashini, S. and V. Kavitha, A Metadata Based Storage Model for Securing Data in Cloud Environment in proceeding of: 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2011, Beijing, China, October 10-12, [6] Ms. P. R. Bhuyar, Dr. A.D. Gawande, Prof. A.B.Deshmukh Horizontal Fragmentation Techniques in Distributed Database in International Journal of Scientific and Research Publications, Volume 2, Issue 5, May [7] Himel Dev, Tanmoy Sen, Madhusudan Basak and Mohammed Eunus Ali An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks in Proceedings of, the Third International Workshop on Data Intensive Computing in the Clouds DataCloud 2012, Salt Lake City, UT. [8] Abraham Silberschatz, Henry F. Korth, S. Sudarshan Database system concepts McGraw-Hill Higher Education, 2006.
ABSTRACT: [Type text] Page 2109
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2109-2115 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in ABSTRACT: Database Management System as a Cloud Computing
5-Layered Architecture of Cloud Database Management System
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database
Survey on Secure Data mining in Cloud Computing
Survey on Secure Data mining in Cloud Computing I Uppunuthula Venkateshwarlu, II Puppala Priyanka I,II M.Tech,Computer Science and Engineering, JNTUH, Hyderabad, AP, India Abstract Data mining techniques
chapater 7 : Distributed Database Management Systems
chapater 7 : Distributed Database Management Systems Distributed Database Management System When an organization is geographically dispersed, it may choose to store its databases on a central database
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
MyDBaaS: A Framework for Database-as-a-Service Monitoring
MyDBaaS: A Framework for Database-as-a-Service Monitoring David A. Abreu 1, Flávio R. C. Sousa 1 José Antônio F. Macêdo 1, Francisco J. L. Magalhães 1 1 Department of Computer Science Federal University
Secured Storage of Outsourced Data in Cloud Computing
Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
CLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICE Waleed Al Shehri Department of Computing, Macquarie University Sydney, NSW 2109, Australia [email protected] ABSTRACT Cloud computing has been the
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
References. Introduction to Database Systems CSE 444. Motivation. Basic Features. Outline: Database in the Cloud. Outline
References Introduction to Database Systems CSE 444 Lecture 24: Databases as a Service YongChul Kwon Amazon SimpleDB Website Part of the Amazon Web services Google App Engine Datastore Website Part of
Introduction to Database Systems CSE 444
Introduction to Database Systems CSE 444 Lecture 24: Databases as a Service YongChul Kwon References Amazon SimpleDB Website Part of the Amazon Web services Google App Engine Datastore Website Part of
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Where We Are. References. Cloud Computing. Levels of Service. Cloud Computing History. Introduction to Data Management CSE 344
Where We Are Introduction to Data Management CSE 344 Lecture 25: DBMS-as-a-service and NoSQL We learned quite a bit about data management see course calendar Three topics left: DBMS-as-a-service and NoSQL
Fragmentation and Data Allocation in the Distributed Environments
Annals of the University of Craiova, Mathematics and Computer Science Series Volume 38(3), 2011, Pages 76 83 ISSN: 1223-6934, Online 2246-9958 Fragmentation and Data Allocation in the Distributed Environments
Performance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
Hadoop Operations Management for Big Data Clusters in Telecommunication Industry
Hadoop Operations Management for Big Data Clusters in Telecommunication Industry N. Kamalraj Asst. Prof., Department of Computer Technology Dr. SNS Rajalakshmi College of Arts and Science Coimbatore-49
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
NoSQL systems: introduction and data models. Riccardo Torlone Università Roma Tre
NoSQL systems: introduction and data models Riccardo Torlone Università Roma Tre Why NoSQL? In the last thirty years relational databases have been the default choice for serious data storage. An architect
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
TECHNIQUES FOR DATA REPLICATION ON DISTRIBUTED DATABASES
Constantin Brâncuşi University of Târgu Jiu ENGINEERING FACULTY SCIENTIFIC CONFERENCE 13 th edition with international participation November 07-08, 2008 Târgu Jiu TECHNIQUES FOR DATA REPLICATION ON DISTRIBUTED
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Distributed Databases. Concepts. Why distributed databases? Distributed Databases Basic Concepts
Distributed Databases Basic Concepts Distributed Databases Concepts. Advantages and disadvantages of distributed databases. Functions and architecture for a DDBMS. Distributed database design. Levels of
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Introduction. Chapter 1. Introducing the Database. Data vs. Information
Chapter 1 Objectives: to learn The difference between data and information What a database is, the various types of databases, and why they are valuable assets for decision making The importance of database
Introduction to Databases
Page 1 of 5 Introduction to Databases An introductory example What is a database? Why do we need Database Management Systems? The three levels of data abstraction What is a Database Management System?
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,
NoSQL and Hadoop Technologies On Oracle Cloud
NoSQL and Hadoop Technologies On Oracle Cloud Vatika Sharma 1, Meenu Dave 2 1 M.Tech. Scholar, Department of CSE, Jagan Nath University, Jaipur, India 2 Assistant Professor, Department of CSE, Jagan Nath
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
Distributed Databases in a Nutshell
Distributed Databases in a Nutshell Marc Pouly [email protected] Department of Informatics University of Fribourg, Switzerland Priciples of Distributed Database Systems M. T. Özsu, P. Valduriez Prentice
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Content Problems of managing data resources in a traditional file environment Capabilities and value of a database management
TOP-DOWN APPROACH PROCESS BUILT ON CONCEPTUAL DESIGN TO PHYSICAL DESIGN USING LIS, GCS SCHEMA
TOP-DOWN APPROACH PROCESS BUILT ON CONCEPTUAL DESIGN TO PHYSICAL DESIGN USING LIS, GCS SCHEMA Ajay B. Gadicha 1, A. S. Alvi 2, Vijay B. Gadicha 3, S. M. Zaki 4 1&4 Deptt. of Information Technology, P.
Elasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -
Database and Data Mining Security
Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment
Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching
1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page
ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001
ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel
Issues and Challenges of Data Transaction Management in Cloud Environment
Issues and Challenges of Data Transaction Management in Cloud Environment J.Antony John Prabu 1, Dr.S Britto Ramesh Kumar 2 1 Research Scholar and Assistant Professor, Department of Computer Science St.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE Contents How to Buy Cloud-to-Cloud Backup...................... 4 Wait What is Cloud-to-Cloud Backup?.....................
Survey on Multi-Tenant Data Architecture for SaaS
www.ijcsi.org 198 Survey on Multi-Tenant Data Architecture for SaaS Li heng 1, Yang dan 2 and Zhang xiaohong 3 1 College of Computer Science, Chongqing University Chongqing, 401331, China 2 School of Software
Course 103402 MIS. Foundations of Business Intelligence
Oman College of Management and Technology Course 103402 MIS Topic 5 Foundations of Business Intelligence CS/MIS Department Organizing Data in a Traditional File Environment File organization concepts Database:
Building Secure Cloud Applications. On the Microsoft Windows Azure platform
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework Many corporations and Independent Software Vendors considering cloud computing adoption face a similar challenge: how should
An Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
DATABASE MANAGEMENT SYSTEM
REVIEW ARTICLE DATABASE MANAGEMENT SYSTEM Sweta Singh Assistant Professor, Faculty of Management Studies, BHU, Varanasi, India E-mail: [email protected] ABSTRACT Today, more than at any previous
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
PartJoin: An Efficient Storage and Query Execution for Data Warehouses
PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE [email protected] 2
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems
A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems Ismail Hababeh School of Computer Engineering and Information Technology, German-Jordanian University Amman, Jordan Abstract-
Now that you have a Microsoft private cloud, what the heck are you going to do with it?
Now that you have a Microsoft private cloud, what the heck are you going to do with it? Tony Bradley Microsoft MVP, CISSP-ISSAP Principal Analyst, Bradley Strategy Group Abstract Choosing and building
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON BIG DATA MANAGEMENT AND ITS SECURITY PRUTHVIKA S. KADU 1, DR. H. R.
Secure Database as a Service-a Review
Secure Database as a Service-a Review Prof Swarnalata Bollavarapu 1, Kamal Mistry 2 Assistant Professor, Department of Computer Engineering, MPSTME, Mumbai, India 1 M-Tech Student, Department of Computer
Email: [email protected]. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY
Federation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
DATA WAREHOUSING AND OLAP TECHNOLOGY
DATA WAREHOUSING AND OLAP TECHNOLOGY Manya Sethi MCA Final Year Amity University, Uttar Pradesh Under Guidance of Ms. Shruti Nagpal Abstract DATA WAREHOUSING and Online Analytical Processing (OLAP) are
Chapter 1: Introduction
Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
Chapter 12 Databases, Controls, and Security
Systems Analysis and Design in a Changing World, sixth edition 12-1 Chapter 12 Databases, Controls, and Security Table of Contents Chapter Overview Learning Objectives Notes on Opening Case and EOC Cases
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server
Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The
