SlideShare a Scribd company logo
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
Distributed, Concurrent, and Independent Access to Encrypted Cloud 
Databases 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
ABSTRACT 
Placing critical data in the hands of a cloud provider should come with the guarantee of security 
and availability for data at rest, in motion, and in use. Several alternatives exist for storage 
services, while data confidentiality solutions for the database as a service paradigm are still 
immature. We propose a novel architecture that integrates cloud database services with data 
confidentiality and the possibility of executing concurrent operations on encrypted data. This is 
th first solution supporting geographically distributed clients to connect directly to an encrypted 
cloud database, and to execute concurrent and independent operations including those modifying 
the database structure. The proposed architecture has the further advantage of eliminating 
intermediate proxies that limit the elasticity, availability, and scalability properties that are 
intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through 
theoretical analyses and extensive experimental results based on a prototype implementation 
subject to the TPC-C standard benchmark for different numbers of clients and network latencies. 
EXISTING SYSTEM: 
Original plain data must be accessible only by trusted parties that do not include cloud 
providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. 
Satisfying these goals has different levels of complexity depending on the type of cloud service. 
There are several solutions ensuring confidentiality for the storage as a service paradigm, while 
guaranteeing confidentiality in the database as a service (DBaaS) paradigm is still an open 
research area. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Cannot apply fully homomorphic encryption schemes because of their excessive 
computational complexity. 
PROPOSED SYSTEM: 
 We propose a novel architecture that integrates cloud database services with data 
confidentiality and the possibility of executing concurrent operations on encrypted data.
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
 This is the first solution supporting geographically distributed clients to connect directly 
to an encrypted cloud database, and to execute concurrent and independent operations 
including those modifying the database structure. 
 The proposed architecture has the further advantage of eliminating intermediate proxies 
that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based 
 Secure DBaaS provides several original features that differentiate it from previous work 
in the field of security for remote database services. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The proposed architecture does not require modifications to the cloud database, and it is 
immediately applicable to existing cloud DBaaS, such as the experimented PostgreSQL 
Plus Cloud Database, Windows Azure and Xeround . 
 There are no theoretical and practical limits to extend our solution to other platforms and 
to include new encryption algorithm. 
 It guarantees data confidentiality by allowing a cloud database server to execute 
concurrent SQL operations (not only read/write, but also modifications to the database 
structure) over encrypted data. 
 It provides the same availability, elasticity, and scalability of the original cloud DBaaS 
because it does not require any intermediate server. 
Contact: 9703109334, 9533694296 
solutions. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, and 
Independent Access to Encrypted Cloud Databases”, VOL. 25, NO. 2, FEBRUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot (20)

DOC
Probabilistic consolidation of virtual machines in self organizing cloud data...
Papitha Velumani
 
PDF
Cluster computing report
Sudhanshu kumar Sah
 
PPTX
Cluster computing ppt
DC Graphics
 
PPT
Cluster Computers
shopnil786
 
PPTX
Clusters
Muhammad Ishaq
 
PPT
Cluster Computing Seminar.
Balvant Biradar
 
PDF
A stochastic approach to analysis of energy aware dvs-enabled cloud datacenters
ieeepondy
 
PPT
Cluster Computing
BOSS Webtech
 
PPTX
Cluster Computing
AAKASH SINGH
 
PPTX
CLUSTER COMPUTING
anshugautamgautam
 
PPTX
Cluster computing
reddivarihareesh
 
DOC
Clusetrreport
Sreejith Nair
 
PPTX
Cluster computing
Kajal Thakkar
 
PPTX
cluster computing
SANDEEPKUMARSINGH97
 
DOC
Computer cluster
Shiva Krishna Chandra Shekar
 
PPTX
cluster computing
anjalibhandari11011995
 
PPT
Cluster computing2
ghanshyamrdias
 
PPT
Cluster Computing
NIKHIL NAIR
 
PPTX
Cluster computing
Venkat Sai Sharath Mudhigonda
 
PPTX
Cluster computing
Adarsh110
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Papitha Velumani
 
Cluster computing report
Sudhanshu kumar Sah
 
Cluster computing ppt
DC Graphics
 
Cluster Computers
shopnil786
 
Clusters
Muhammad Ishaq
 
Cluster Computing Seminar.
Balvant Biradar
 
A stochastic approach to analysis of energy aware dvs-enabled cloud datacenters
ieeepondy
 
Cluster Computing
BOSS Webtech
 
Cluster Computing
AAKASH SINGH
 
CLUSTER COMPUTING
anshugautamgautam
 
Cluster computing
reddivarihareesh
 
Clusetrreport
Sreejith Nair
 
Cluster computing
Kajal Thakkar
 
cluster computing
SANDEEPKUMARSINGH97
 
cluster computing
anjalibhandari11011995
 
Cluster computing2
ghanshyamrdias
 
Cluster Computing
NIKHIL NAIR
 
Cluster computing
Adarsh110
 

Similar to distributed, concurrent, and independent access to encrypted cloud databases (20)

DOCX
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
chennaijp
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
IEEEFINALSEMSTUDENTPROJECTS
 
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEEFINALYEARSTUDENTPROJECT
 
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEEFINALSEMSTUDENTPROJECTS
 
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
JPINFOTECH JAYAPRAKASH
 
PDF
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
hemanthbbc
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
ASAITHAMBIRAJAA
 
PDF
An efficient concurrent access on cloud database using secureDBAAS
IJTET Journal
 
PDF
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
ijtsrd
 
PDF
A Security and Privacy Measure for Encrypted Cloud Database
IJTET Journal
 
PDF
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
PDF
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
PPTX
Next basepresentation
Shiyam Hoda
 
PDF
Aes based secured framework for cloud databases
IJARIIT
 
PDF
Sensitive Data Protection in DBaaS
KAMLESH HINGWE
 
PPTX
doctoral committee meeting minutes of synopsis meeting minutes
prathapkumarKulothun
 
PPT
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
PDF
Challenges Management and Opportunities of Cloud DBA
inventy
 
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
chennaijp
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEEFINALSEMSTUDENTPROJECTS
 
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
JPINFOTECH JAYAPRAKASH
 
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
ASAITHAMBIRAJAA
 
An efficient concurrent access on cloud database using secureDBAAS
IJTET Journal
 
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
ijtsrd
 
A Security and Privacy Measure for Encrypted Cloud Database
IJTET Journal
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Next basepresentation
Shiyam Hoda
 
Aes based secured framework for cloud databases
IJARIIT
 
Sensitive Data Protection in DBaaS
KAMLESH HINGWE
 
doctoral committee meeting minutes of synopsis meeting minutes
prathapkumarKulothun
 
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
Challenges Management and Opportunities of Cloud DBA
inventy
 
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
swathi78
 
DOCX
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
DOCX
web service recommendation via exploiting location and qo s information
swathi78
 
DOCX
privacy-enhanced web service composition
swathi78
 
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
DOCX
friend book a semantic-based friend recommendation system for social networks
swathi78
 
DOCX
efficient authentication for mobile and pervasive computing
swathi78
 
DOCX
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
DOCX
an incentive framework for cellular traffic offloading
swathi78
 
DOCX
secure outsourced attribute-based signatures
swathi78
 
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
DOCX
the design and evaluation of an information sharing system for human networks
swathi78
 
DOCX
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
DOCX
sos a distributed mobile q&a system based on social networks
swathi78
 
DOCX
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
DOCX
rre a game-theoretic intrusion response and recovery engine
swathi78
 
DOCX
on false data-injection attacks against power system state estimation modelin...
swathi78
 
DOCX
loca ward a security and privacy aware location-based rewarding system
swathi78
 
DOCX
exploiting service similarity for privacy in location-based search queries
swathi78
 
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
secure mining of association rules in horizontally distributed databases
swathi78
 
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
web service recommendation via exploiting location and qo s information
swathi78
 
privacy-enhanced web service composition
swathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
friend book a semantic-based friend recommendation system for social networks
swathi78
 
efficient authentication for mobile and pervasive computing
swathi78
 
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
an incentive framework for cellular traffic offloading
swathi78
 
secure outsourced attribute-based signatures
swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
the design and evaluation of an information sharing system for human networks
swathi78
 
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
sos a distributed mobile q&a system based on social networks
swathi78
 
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
rre a game-theoretic intrusion response and recovery engine
swathi78
 
on false data-injection attacks against power system state estimation modelin...
swathi78
 
loca ward a security and privacy aware location-based rewarding system
swathi78
 
exploiting service similarity for privacy in location-based search queries
swathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
Ad

Recently uploaded (20)

PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
GitOps_Without_K8s_Training simple one without k8s
DanialHabibi2
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PPTX
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
GitOps_Without_K8s_Training simple one without k8s
DanialHabibi2
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
MRRS Strength and Durability of Concrete
CivilMythili
 
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Design Thinking basics for Engineers.pdf
CMR University
 
Thermal runway and thermal stability.pptx
godow93766
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 

distributed, concurrent, and independent access to encrypted cloud databases

  • 1. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in ABSTRACT Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is th first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies. EXISTING SYSTEM: Original plain data must be accessible only by trusted parties that do not include cloud providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. Satisfying these goals has different levels of complexity depending on the type of cloud service. There are several solutions ensuring confidentiality for the storage as a service paradigm, while guaranteeing confidentiality in the database as a service (DBaaS) paradigm is still an open research area. DISADVANTAGES OF EXISTING SYSTEM:  Cannot apply fully homomorphic encryption schemes because of their excessive computational complexity. PROPOSED SYSTEM:  We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data.
  • 2. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases  This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure.  The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based  Secure DBaaS provides several original features that differentiate it from previous work in the field of security for remote database services. ADVANTAGES OF PROPOSED SYSTEM:  The proposed architecture does not require modifications to the cloud database, and it is immediately applicable to existing cloud DBaaS, such as the experimented PostgreSQL Plus Cloud Database, Windows Azure and Xeround .  There are no theoretical and practical limits to extend our solution to other platforms and to include new encryption algorithm.  It guarantees data confidentiality by allowing a cloud database server to execute concurrent SQL operations (not only read/write, but also modifications to the database structure) over encrypted data.  It provides the same availability, elasticity, and scalability of the original cloud DBaaS because it does not require any intermediate server. Contact: 9703109334, 9533694296 solutions. Email id: [email protected], www.logicsystems.org.in
  • 3. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 4. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases”, VOL. 25, NO. 2, FEBRUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: [email protected], www.logicsystems.org.in