Survey Paper | Information Technology | India | Volume 4 Issue 1, January 2015
Survey on: Query Services in Cloud Security
Sapana S. Vasave | Dr. Kishor R. Kolhe
Abstract: Now-a-days Cloud computing is become more popular as cloud infrastructure for storing the data. Data owners are stored their data in public cloud for the flexibility and cost-saving. In data privacy protection, before saving sensitive data it is encrypted. User trust, privacy and security are more concerns. Most frequently used queries for online data analytic is the range query. Consumer-centric cloud computing is used for development of smart electronic devices combined with the cloud computing technologies. Different cloud services are provided to the customers with the premise that an effective and efficient cloud search service is provided. Locality-sensitive hashing is provided the approximate queries that to distributed data servers which give problem of the imbalanced load and space inefficiency, in which limits the query accuracy and incurs long query latency between users and cloud servers. This type of query services could be expensive for data owner. More incremented services computing and cloud computing, it is possible to outsource large databases to database service providers and the providers maintain the range-query service. Using outsourced services, the data owner can reduce the cost of storing data in cloud infrastructure. Cloud computing providing reliable, customized, and guaranteed computing dynamic environment for end users.
Keywords: Cloud computing security, search, Multidimensional Range Query, Random Space Encryption, consumer-centric cloud, Hybrid storage systems, and approximate queries
Edition: Volume 4 Issue 1, January 2015,
Pages: 1570 - 1572
How to Cite this Article?
Sapana S. Vasave, Dr. Kishor R. Kolhe, "Survey on: Query Services in Cloud Security", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 1570-1572, https://www.ijsr.net/get_abstract.php?paper_id=SUB15315
How to Share this Article?
Similar Articles with Keyword 'Cloud computing security'
Survey on Cloud Computing Security Algorithms
Akash Kanthale | S. P. Potdar
Up in the Air: Cloud Computing Security and RSA Algorithm
Pooja Bharadwaj | Shivani Mankotia