Survey Paper | Information Technology | India | Volume 4 Issue 1, January 2015
Survey on: Query Services in Cloud Security
Sapana S. Vasave, Dr. Kishor R. Kolhe
Now-a-days Cloud computing is become more popular as cloud infrastructure for storing the data. Data owners are stored their data in public cloud for the flexibility and cost-saving. In data privacy protection, before saving sensitive data it is encrypted. User trust, privacy and security are more concerns. Most frequently used queries for online data analytic is the range query. Consumer-centric cloud computing is used for development of smart electronic devices combined with the cloud computing technologies. Different cloud services are provided to the customers with the premise that an effective and efficient cloud search service is provided. Locality-sensitive hashing is provided the approximate queries that to distributed data servers which give problem of the imbalanced load and space inefficiency, in which limits the query accuracy and incurs long query latency between users and cloud servers. This type of query services could be expensive for data owner. More incremented services computing and cloud computing, it is possible to outsource large databases to database service providers and the providers maintain the range-query service. Using outsourced services, the data owner can reduce the cost of storing data in cloud infrastructure. Cloud computing providing reliable, customized, and guaranteed computing dynamic environment for end users.
Keywords: Cloud computing security, search, Multidimensional Range Query, Random Space Encryption, consumer-centric cloud, Hybrid storage systems, and approximate queries
Edition: Volume 4 Issue 1, January 2015
Pages: 1570 - 1572
How to Cite this Article?
Sapana S. Vasave, Dr. Kishor R. Kolhe, "Survey on: Query Services in Cloud Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15315, Volume 4 Issue 1, January 2015, 1570 - 1572
102 PDF Views | 93 PDF Downloads
Similar Articles with Keyword 'Cloud computing security'
Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016
Pages: 1103 - 1107Up in the Air: Cloud Computing Security and RSA Algorithm
Pooja Bharadwaj, Shivani Mankotia
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1865 - 1867Survey on Cloud Computing Security Algorithms
Akash Kanthale, S. P. Potdar
Survey Paper, Information Technology, India, Volume 4 Issue 1, January 2015
Pages: 1570 - 1572Survey on: Query Services in Cloud Security
Sapana S. Vasave, Dr. Kishor R. Kolhe
Similar Articles with Keyword 'search'
Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015
Pages: 24 - 27An Approach for Canny Edge Detection Algorithm on Face Recognition
A. D. Chitra, Dr. P. Ponmuthuramalingam
Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020
Pages: 881 - 889Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya
Kanuku Musyoku, Shitanda Douglas, Nganu Margaret
Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014
Pages: 1896 - 1909Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore
R. Guruprasad, P. Marimuthu
Survey Paper, Information Technology, India, Volume 9 Issue 12, December 2020
Pages: 228 - 232Study of UPI/BHIM Payment System in India
Dinesh M. Kolte, Dr. Veena R. Humbe
Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020
Pages: 502 - 505Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya
Yvonne Oyaro Opiyo, David Nzuki