"Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"
Title | "Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | V. Waghmare, K. Gojre, A. Watpade |
Conference Name | 2015 International Conference on Computational Intelligence and Communication Networks (CICN) |
Date Published | Dec. 2015 |
Publisher | IEEE |
ISBN Number | 978-1-5090-0076-0 |
Accession Number | 16248174 |
Keywords | Advance Encryption Standard, cloud computing, cloud database, commerce, concurrency (computers), concurrent access, confidentiality, cryptography, customer services, database installation, database management, database-as-a-service, Distributed databases, Encryption, encryption algorithm, Master key, meta data, metadata, metadata storage, multiple business, multiple geographically distributed clients, power station, Protected Database-as-a-Service, pubcrawl170105, security, self-reliant access, Servers, storage management |
Abstract | Now a day's cloud computing is power station to run multiple businesses. It is cumulating more and more users every day. Database-as-a-service is service model provided by cloud computing to store, manage and process data on a cloud platform. Database-as-a-service has key characteristics such as availability, scalability, elasticity. A customer does not have to worry about database installation and management. As a replacement, the cloud database service provider takes responsibility for installing and maintaining the database. The real problem occurs when it comes to storing confidential or private information in the cloud database, we cannot rely on the cloud data vendor. A curious cloud database vendor may capture and leak the secret information. For that purpose, Protected Database-as-a-service is a novel solution to this problem that provides provable and pragmatic privacy in the face of a compromised cloud database service provider. Protected Database-as-a-service defines various encryption schemes to choose encryption algorithm and encryption key to encrypt and decrypt data. It also provides "Master key" to users, so that a metadata storage table can be decrypted only by using the master key of the users. As a result, a cloud service vendor never gets access to decrypted data, and even if all servers are jeopardized, in such inauspicious circumstances a cloud service vendor will not be able to decrypt the data. Proposed Protected Database-as-a-service system allows multiple geographically distributed clients to execute concurrent and independent operation on encrypted data and also conserve data confidentiality and consistency at cloud level, to eradicate any intermediate server between the client and the cloud database. |
URL | https://ieeexplore.ieee.org/document/7546201 |
DOI | 10.1109/CICN.2015.158 |
Citation Key | 7546201 |
- encryption algorithm
- storage management
- Servers
- self-reliant access
- security
- pubcrawl170105
- Protected Database-as-a-Service
- power station
- multiple geographically distributed clients
- multiple business
- metadata storage
- metadata
- meta data
- Master key
- Advance Encryption Standard
- encryption
- Distributed databases
- database-as-a-service
- database management
- database installation
- customer services
- Cryptography
- confidentiality
- concurrent access
- concurrency (computers)
- commerce
- cloud database
- Cloud Computing