Full Paper View Go Back

Improving Database Security in Cloud Computing

Ashutosh Kumar1

Section:Survey Paper, Product Type: Journal-Paper
Vol.8 , Issue.1 , pp.120-122, Feb-2020


Online published on Feb 28, 2020


Copyright © Ashutosh Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ashutosh Kumar, “Improving Database Security in Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.1, pp.120-122, 2020.

MLA Style Citation: Ashutosh Kumar "Improving Database Security in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 8.1 (2020): 120-122.

APA Style Citation: Ashutosh Kumar, (2020). Improving Database Security in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 120-122.

BibTex Style Citation:
@article{Kumar_2020,
author = {Ashutosh Kumar},
title = {Improving Database Security in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {1},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {120-122},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1702},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1702
TI - Improving Database Security in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Ashutosh Kumar
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 120-122
IS - 1
VL - 8
SN - 2347-2693
ER -

155 Views    232 Downloads    63 Downloads
  
  

Abstract :
Cloud computing is an age that advances different configurable assets wherein the records is saved and directed in a decentralized way. Regardless, considering the way that the information is out of the proprietor`s control, concerns show up as for information characterization. Encryption systems have in the past been proposed to outfit customers with mystery to the extent re-appropriated limit; in any case, stores of these encryption counts are vulnerable, enabling records security to be constrained unquestionably by a course of action of rules. We bolster a mix of encryption computations and a distribution system to impact database confidentiality. This arrangement separates a database over the cloud in a general sense subject to the level of prosperity gave by the encryption count applied. We survey the benefits of our arrangement with other present counts and assurance that our arrangement gives a noticeably agreeable system that offers customers with data confidentiality and adequate execution.

Key-Words / Index Term :
Cloud Computing, DD-PLAC (Distributed Database-Proxy Less Architecture), encryption, data privacy, decryption algorithm

References :
[1] Luca Ferretti, Michele Colajaani, and Micro Marchetti, “ Distributed, Concurrent, and Independent Access to Distributed Database,” 2015.
[2] Amjad Alsirhani, Peter Bodorik, Srinivas Sampalli, “Improving Database Security in Cloud Computing by Fragmentation of Data,” 2017.
[3] Sajjan R.S., Vijay Ghorpade, Vishvajit Dalimbkar, “A Survey Paper on Data security in Cloud Computing,” 2016.
[4] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews," 2014.
[5] A. Hudic, S. Islam, P. Kieseberg, S. Rennert, and E. R. Weippl, “Data Confidentiality using Fragmentation in Cloud Computing,” 2013.
[6] J. Daemen, “The design of Rijndael : AES - the Advanced Encryption Standard with 17 Tables,” 2002.
[7] Tim Mather, Subra Kumaraswamy, and Shahed Latif ”Cloud Security and Privacy” Published by O’Reilly Media, Inc.
[8] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motawani, “Distributing Data for Secure Database Services,” 2011.
[9] Danie J. Abadi, “Data Management in the Cloud:Limitations and Opportunities,” 2009.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation