Full Paper View Go Back
Improving Database Security in Cloud Computing
Ashutosh Kumar1
Section:Survey Paper, Product Type: Journal-Paper
Vol.8 ,
Issue.1 , pp.120-122, Feb-2020
Online published on Feb 28, 2020
Copyright © Ashutosh Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ashutosh Kumar, “Improving Database Security in Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.1, pp.120-122, 2020.
MLA Style Citation: Ashutosh Kumar "Improving Database Security in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 8.1 (2020): 120-122.
APA Style Citation: Ashutosh Kumar, (2020). Improving Database Security in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 120-122.
BibTex Style Citation:
@article{Kumar_2020,
author = {Ashutosh Kumar},
title = {Improving Database Security in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {1},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {120-122},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1702},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1702
TI - Improving Database Security in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Ashutosh Kumar
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 120-122
IS - 1
VL - 8
SN - 2347-2693
ER -
Abstract :
Cloud computing is an age that advances different configurable assets wherein the records is saved and directed in a decentralized way. Regardless, considering the way that the information is out of the proprietor`s control, concerns show up as for information characterization. Encryption systems have in the past been proposed to outfit customers with mystery to the extent re-appropriated limit; in any case, stores of these encryption counts are vulnerable, enabling records security to be constrained unquestionably by a course of action of rules. We bolster a mix of encryption computations and a distribution system to impact database confidentiality. This arrangement separates a database over the cloud in a general sense subject to the level of prosperity gave by the encryption count applied. We survey the benefits of our arrangement with other present counts and assurance that our arrangement gives a noticeably agreeable system that offers customers with data confidentiality and adequate execution.
Key-Words / Index Term :
Cloud Computing, DD-PLAC (Distributed Database-Proxy Less Architecture), encryption, data privacy, decryption algorithm
References :
[1] Luca Ferretti, Michele Colajaani, and Micro Marchetti, “ Distributed, Concurrent, and Independent Access to Distributed Database,” 2015.
[2] Amjad Alsirhani, Peter Bodorik, Srinivas Sampalli, “Improving Database Security in Cloud Computing by Fragmentation of Data,” 2017.
[3] Sajjan R.S., Vijay Ghorpade, Vishvajit Dalimbkar, “A Survey Paper on Data security in Cloud Computing,” 2016.
[4] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews," 2014.
[5] A. Hudic, S. Islam, P. Kieseberg, S. Rennert, and E. R. Weippl, “Data Confidentiality using Fragmentation in Cloud Computing,” 2013.
[6] J. Daemen, “The design of Rijndael : AES - the Advanced Encryption Standard with 17 Tables,” 2002.
[7] Tim Mather, Subra Kumaraswamy, and Shahed Latif ”Cloud Security and Privacy” Published by O’Reilly Media, Inc.
[8] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motawani, “Distributing Data for Secure Database Services,” 2011.
[9] Danie J. Abadi, “Data Management in the Cloud:Limitations and Opportunities,” 2009.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.