SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Distributed, Concurrent, and Independent Access to 
Encrypted Cloud Databases 
ABSTRACT: 
Placing critical data in the hands of a cloud provider should come with the 
guarantee of security and availability for data at rest, in motion, and in use. Several 
alternatives exist for storage services, while data confidentiality solutions for the 
database as a service paradigm are still immature. We propose a novel architecture 
that integrates cloud database services with data confidentiality and the possibility 
of executing concurrent operations on encrypted data. This is the first solution 
supporting geographically distributed clients to connect directly to an encrypted 
cloud database, and to execute concurrent and independent operations including 
those modifying the database structure. The proposed architecture has the further 
advantage of eliminating intermediate proxies that limit the elasticity, availability, 
and scalability properties that are intrinsic in cloud-based solutions. The efficacy of 
the proposed architecture is evaluated through theoretical analyses and extensive 
experimental results based on a prototype implementation subject to the TPC-C 
standard benchmark for different numbers of clients and network latencies.
EXISTING SYSTEM: 
Original plain data must be accessible only by trusted parties that do not 
include cloud providers, intermediaries, and Internet; in any untrusted context, data 
must be encrypted. Satisfying these goals has different levels of complexity 
depending on the type of cloud service. There are several solutions ensuring 
confidentiality for the storage as a service paradigm, while guaranteeing 
confidentiality in the database as a service (DBaaS) paradigm is still an open 
research area. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Cannot apply fully homomorphic encryption schemes because of their 
excessive computational complexity. 
PROPOSED SYSTEM: 
 We propose a novel architecture that integrates cloud database services with 
data confidentiality and the possibility of executing concurrent operations on 
encrypted data. 
 This is the first solution supporting geographically distributed clients to 
connect directly to an encrypted cloud database, and to execute concurrent 
and independent operations including those modifying the database 
structure.
 The proposed architecture has the further advantage of eliminating 
intermediate proxies that limit the elasticity, availability, and scalability 
properties that are intrinsic in cloud-based solutions. 
 Secure DBaaS provides several original features that differentiate it from 
previous work in the field of security for remote database services. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The proposed architecture does not require modifications to the cloud 
database, and it is immediately applicable to existing cloud DBaaS, such as 
the experimented PostgreSQL Plus Cloud Database, Windows Azure and 
Xeround . 
 There are no theoretical and practical limits to extend our solution to other 
platforms and to include new encryption algorithm. 
 It guarantees data confidentiality by allowing a cloud database server to 
execute concurrent SQL operations (not only read/write, but also 
modifications to the database structure) over encrypted data. 
 It provides the same availability, elasticity, and scalability of the original 
cloud DBaaS because it does not require any intermediate server. 
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, 
and Independent Access to Encrypted Cloud Databases”, IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 
25, NO. 2, FEBRUARY 2014.

More Related Content

DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
DOCX
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
DOCX
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
DOCX
Distributed, concurrent, and independent access to encrypted cloud databases
DOCX
distributed, concurrent, and independent access to encrypted cloud databases
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
PDF
Concurrent And Independent Access To Encrypted Cloud Databases
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
Distributed, concurrent, and independent access to encrypted cloud databases
distributed, concurrent, and independent access to encrypted cloud databases
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud Databases

What's hot (17)

DOC
Distributed, concurrent, and independent access to encrypted cloud databases
PPT
Distributed, concurrent, and independent access to encrypted cloud databases
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PDF
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
PPTX
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
PPTX
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
DOCX
Secure cloud storage with data dynamic using secure network coding technique
DOCX
Toward secure and dependable
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
PPT
Privacy preserving public auditing for regenerating-code-based
PPTX
Privacy preserving public auditing
DOCX
Privacy preserving delegated access control in public clouds
PPTX
Cluster computing pptl (2)
PPTX
Oruta ppt
DOCX
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
DOCX
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
Secure cloud storage with data dynamic using secure network coding technique
Toward secure and dependable
A hybrid cloud approach for secure authorized deduplication
Reliable and confidential cloud storage with efficient data forwarding functi...
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing
Privacy preserving delegated access control in public clouds
Cluster computing pptl (2)
Oruta ppt
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
Ad

Similar to 2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independent access to encrypted cloud databases (20)

DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
DOCX
distributed, concurrent, and independent access to encrypted cloud databases
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
PDF
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
DOC
Integrity for join queries in the cloud
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PPT
Ensuring d.s
PDF
A Security and Privacy Measure for Encrypted Cloud Database
PPT
Secure Data Sharing in Cloud (SDSC)
PPTX
oracle.pptx
PPTX
CLOUD SEMINAR.pptx
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PPTX
Saa s multitenant database architecture
PDF
Slides: Accelerating Queries on Cloud Data Lakes
PDF
Data Lake and the rise of the microservices
PDF
Cloud & Data Center Networking
PPTX
Cloud Computing
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
An efficient concurrent access on cloud database using secureDBAAS
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
distributed, concurrent, and independent access to encrypted cloud databases
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
Integrity for join queries in the cloud
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring d.s
A Security and Privacy Measure for Encrypted Cloud Database
Secure Data Sharing in Cloud (SDSC)
oracle.pptx
CLOUD SEMINAR.pptx
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Saa s multitenant database architecture
Slides: Accelerating Queries on Cloud Data Lakes
Data Lake and the rise of the microservices
Cloud & Data Center Networking
Cloud Computing
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
An efficient concurrent access on cloud database using secureDBAAS
Ad

More from IEEEFINALSEMSTUDENTPROJECTS (17)

DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
composite construction of structures.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Welding lecture in detail for understanding
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Sustainable Sites - Green Building Construction
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Operating System & Kernel Study Guide-1 - converted.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
R24 SURVEYING LAB MANUAL for civil enggi
Automation-in-Manufacturing-Chapter-Introduction.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Internet of Things (IOT) - A guide to understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
composite construction of structures.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Welding lecture in detail for understanding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Sustainable Sites - Green Building Construction
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx

2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independent access to encrypted cloud databases

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases ABSTRACT: Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.
  • 2. EXISTING SYSTEM: Original plain data must be accessible only by trusted parties that do not include cloud providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. Satisfying these goals has different levels of complexity depending on the type of cloud service. There are several solutions ensuring confidentiality for the storage as a service paradigm, while guaranteeing confidentiality in the database as a service (DBaaS) paradigm is still an open research area. DISADVANTAGES OF EXISTING SYSTEM:  Cannot apply fully homomorphic encryption schemes because of their excessive computational complexity. PROPOSED SYSTEM:  We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data.  This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure.
  • 3.  The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions.  Secure DBaaS provides several original features that differentiate it from previous work in the field of security for remote database services. ADVANTAGES OF PROPOSED SYSTEM:  The proposed architecture does not require modifications to the cloud database, and it is immediately applicable to existing cloud DBaaS, such as the experimented PostgreSQL Plus Cloud Database, Windows Azure and Xeround .  There are no theoretical and practical limits to extend our solution to other platforms and to include new encryption algorithm.  It guarantees data confidentiality by allowing a cloud database server to execute concurrent SQL operations (not only read/write, but also modifications to the database structure) over encrypted data.  It provides the same availability, elasticity, and scalability of the original cloud DBaaS because it does not require any intermediate server. SYSTEM ARCHITECTURE:
  • 4. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:
  • 5.  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.