Downloads: 116
Survey Paper | Information Technology | India | Volume 4 Issue 1, January 2015
Survey on: Query Services in Cloud Security
Sapana S. Vasave | Dr. Kishor R. Kolhe
Abstract: Now-a-days Cloud computing is become more popular as cloud infrastructure for storing the data. Data owners are stored their data in public cloud for the flexibility and cost-saving. In data privacy protection, before saving sensitive data it is encrypted. User trust, privacy and security are more concerns. Most frequently used queries for online data analytic is the range query. Consumer-centric cloud computing is used for development of smart electronic devices combined with the cloud computing technologies. Different cloud services are provided to the customers with the premise that an effective and efficient cloud search service is provided. Locality-sensitive hashing is provided the approximate queries that to distributed data servers which give problem of the imbalanced load and space inefficiency, in which limits the query accuracy and incurs long query latency between users and cloud servers. This type of query services could be expensive for data owner. More incremented services computing and cloud computing, it is possible to outsource large databases to database service providers and the providers maintain the range-query service. Using outsourced services, the data owner can reduce the cost of storing data in cloud infrastructure. Cloud computing providing reliable, customized, and guaranteed computing dynamic environment for end users.
Keywords: Cloud computing security, search, Multidimensional Range Query, Random Space Encryption, consumer-centric cloud, Hybrid storage systems, and approximate queries
Edition: Volume 4 Issue 1, January 2015,
Pages: 1570 - 1572
Similar Articles with Keyword 'Cloud computing security'
Downloads: 0
Analysis Study Research Paper, Information Technology, United States of America, Volume 13 Issue 2, February 2024
Pages: 494 - 500Evolving Trends in Open-Source RDBMS: Performance, Scalability and Security Insights
Naresh Kumar Miryala
Downloads: 106
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1865 - 1867Survey on Cloud Computing Security Algorithms
Akash Kanthale | S. P. Potdar