Privacy Preserved Encrypted Cloud Data Access
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 101

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Several alternatives exist for storage services with the guarantee of security and availability for data at rest, in motion, and in use. In a cloud context, security can improve due to centralization of data, increased security-forced resources etc. The existing SecureDBaas architecture, integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This architecture has the further advantage of eliminating intermediate proxies. In this paper, propose architecture by providing security to SecureDBaaS. Here introducing a trusted third party to check whether any corruption occur at the cloud server database data.

Keywords: Cloud Server Database, Data confidentiality, Encryption, Trusted Third Party, SecureDBaaS

Edition: Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Share this Article

How to Cite this Article?

Anes P. A., Neethu Francis, "Privacy Preserved Encrypted Cloud Data Access", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151835, Volume 4 Issue 2, February 2015, 2457 - 2460

Enter Your Email Address




Similar Articles with Keyword 'Data confidentiality'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 94

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'Trusted Third Party'

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Similar Articles with Keyword 'SecureDBaaS'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1731 - 1735

Concurrent and Free Accessing in Encrypted Cloud Databases

G. Sudheer Kumar, P. Pavan Kumar

Share this Article

Downloads: 112

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2215 - 2218

Privacy-Preserving Methodology in Distributed Computing using Encrypted Cloud Database

S. J. Chougule, C. M. Jadhav

Share this Article

Downloads: 113 | Weekly Hits: ⮙4 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2004 - 2008

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

Praveenkumar, Jyoti Patil

Share this Article



Top