SlideShare a Scribd company logo
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
Distributed, Concurrent, and Independent Access to Encrypted 
Cloud Databases 
Placing critical data in the hands of a cloud provider should come with the guarantee of security 
and availability for data at rest, in motion, and in use. Several alternatives exist for storage 
services, while data confidentiality solutions for the database as a service paradigm are still 
immature. We propose a novel architecture that integrates cloud database services with data 
confidentiality and the possibility of executing concurrent operations on encrypted data. This is 
the first solution supporting geographically distributed clients to connect directly to an encrypted 
cloud database, and to execute concurrent and independent operations including those modifying 
the database structure. The proposed architecture has the further advantage of eliminating 
intermediate proxies that limit the elasticity, availability, and scalability properties that are 
intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through 
theoretical analyses and extensive experimental results based on a prototype implementation 
subject to the TPC-C standard benchmark for different numbers of clients and network latencies. 
Original plain data must be accessible only by trusted parties that do not include cloud 
providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. 
Satisfying these goals has different levels of complexity depending on the type of cloud service. 
There are several solutions ensuring confidentiality for the storage as a service paradigm, while 
guaranteeing confidentiality in the database as a service (DBaaS) paradigm is still an open 
research area. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Cannot apply fully homomorphic encryption schemes because of their excessive 
computational complexity. 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
 We propose a novel architecture that integrates cloud database services with data 
confidentiality and the possibility of executing concurrent operations on encrypted data. 
 This is the first solution supporting geographically distributed clients to connect directly 
to an encrypted cloud database, and to execute concurrent and indepe ndent operations 
including those modifying the database structure. 
 The proposed architecture has the further advantage of eliminating intermediate proxies 
that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based 
 Secure DBaaS provides several original features that differentiate it from previous work 
in the field of security for remote database services. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The proposed architecture does not require modifications to the cloud database, and it is 
immediately applicable to existing cloud DBaaS, such as the experimented PostgreSQL 
Plus Cloud Database, Windows Azure and Xeround . 
 There are no theoretical and practical limits to extend our solution to other platforms and 
to include new encryption algorithm. 
 It guarantees data confidentiality by allowing a cloud database server to execute 
concurrent SQL operations (not only read/write, but also modifications to the database 
structure) over encrypted data. 
 It provides the same availability, elasticity, and scalability of the original cloud DBaaS 
because it does not require any intermediate server. 
Contact: 9703109334, 9533694296 
solutions. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, and 
Independent Access to Encrypted Cloud Databases”, IEEE TRANSACTIONS ON 
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

DOCX
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
DOCX
Distributed, concurrent, and independent access to encrypted cloud databases
DOC
Distributed, concurrent, and independent access to encrypted cloud databases
PPT
Distributed, concurrent, and independent access to encrypted cloud databases
PDF
Concurrent And Independent Access To Encrypted Cloud Databases
DOCX
distributed, concurrent, and independent access to encrypted cloud databases
DOCX
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
Concurrent And Independent Access To Encrypted Cloud Databases
distributed, concurrent, and independent access to encrypted cloud databases
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...

What's hot (17)

DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
PPTX
Cluster computing
PDF
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
PDF
Cluster computing report
PPTX
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
PPTX
Clusters
PPTX
Cluster computing ppt
PPTX
Cluster computing
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
PPT
Cluster Computing
PPTX
cluster computing
PPT
Cluster Computing Seminar.
PPTX
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
PPT
Cluster Computers
PPTX
Cluster Computing
PPTX
CLUSTER COMPUTING
DOC
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
Cluster computing
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Cluster computing report
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
Clusters
Cluster computing ppt
Cluster computing
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Cluster Computing
cluster computing
Cluster Computing Seminar.
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
Cluster Computers
Cluster Computing
CLUSTER COMPUTING
Ad

Similar to distributed, concurrent, and independent access to encrypted cloud databases (20)

DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
PDF
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
PDF
A Security and Privacy Measure for Encrypted Cloud Database
PDF
An efficient concurrent access on cloud database using secureDBAAS
PDF
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
PDF
A robust and verifiable threshold multi authority access control system in pu...
PDF
Aes based secured framework for cloud databases
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
PPT
Secure Data Sharing in Cloud (SDSC)
PPTX
Identity Based Secure Distributed Storage Scheme
PDF
Challenges Management and Opportunities of Cloud DBA
PPTX
doctoral committee meeting minutes of synopsis meeting minutes
PDF
Accessing secured data in cloud computing environment
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A Security and Privacy Measure for Encrypted Cloud Database
An efficient concurrent access on cloud database using secureDBAAS
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
A robust and verifiable threshold multi authority access control system in pu...
Aes based secured framework for cloud databases
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
Secure Data Sharing in Cloud (SDSC)
Identity Based Secure Distributed Storage Scheme
Challenges Management and Opportunities of Cloud DBA
doctoral committee meeting minutes of synopsis meeting minutes
Accessing secured data in cloud computing environment
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
web service recommendation via exploiting location and qo s information
DOCX
privacy-enhanced web service composition
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
DOCX
friend book a semantic-based friend recommendation system for social networks
DOCX
efficient authentication for mobile and pervasive computing
DOCX
cooperative caching for efficient data access in disruption tolerant networks
DOCX
an incentive framework for cellular traffic offloading
DOCX
secure outsourced attribute-based signatures
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
DOCX
the design and evaluation of an information sharing system for human networks
DOCX
the client assignment problem for continuous distributed interactive applicat...
DOCX
sos a distributed mobile q&a system based on social networks
DOCX
securing broker-less publish subscribe systems using identity-based encryption
DOCX
rre a game-theoretic intrusion response and recovery engine
DOCX
on false data-injection attacks against power system state estimation modelin...
DOCX
loca ward a security and privacy aware location-based rewarding system
DOCX
exploiting service similarity for privacy in location-based search queries
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
secure mining of association rules in horizontally distributed databases
a system for denial-of-service attack detection based on multivariate correla...
web service recommendation via exploiting location and qo s information
privacy-enhanced web service composition
optimal distributed malware defense in mobile networks with heterogeneous dev...
friend book a semantic-based friend recommendation system for social networks
efficient authentication for mobile and pervasive computing
cooperative caching for efficient data access in disruption tolerant networks
an incentive framework for cellular traffic offloading
secure outsourced attribute-based signatures
traffic pattern-based content leakage detection for trusted content delivery ...
the design and evaluation of an information sharing system for human networks
the client assignment problem for continuous distributed interactive applicat...
sos a distributed mobile q&a system based on social networks
securing broker-less publish subscribe systems using identity-based encryption
rre a game-theoretic intrusion response and recovery engine
on false data-injection attacks against power system state estimation modelin...
loca ward a security and privacy aware location-based rewarding system
exploiting service similarity for privacy in location-based search queries
enabling trustworthy service evaluation in service-oriented mobile social net...

Recently uploaded (20)

PPT
Project quality management in manufacturing
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Welding lecture in detail for understanding
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PPT on Performance Review to get promotions
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Well-logging-methods_new................
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Geodesy 1.pptx...............................................
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
bas. eng. economics group 4 presentation 1.pptx
Project quality management in manufacturing
CYBER-CRIMES AND SECURITY A guide to understanding
Welding lecture in detail for understanding
Lecture Notes Electrical Wiring System Components
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT on Performance Review to get promotions
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Well-logging-methods_new................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Geodesy 1.pptx...............................................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
OOP with Java - Java Introduction (Basics)
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
bas. eng. economics group 4 presentation 1.pptx

distributed, concurrent, and independent access to encrypted cloud databases

  • 1. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies. Original plain data must be accessible only by trusted parties that do not include cloud providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. Satisfying these goals has different levels of complexity depending on the type of cloud service. There are several solutions ensuring confidentiality for the storage as a service paradigm, while guaranteeing confidentiality in the database as a service (DBaaS) paradigm is still an open research area. DISADVANTAGES OF EXISTING SYSTEM:  Cannot apply fully homomorphic encryption schemes because of their excessive computational complexity. Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases  We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data.  This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and indepe ndent operations including those modifying the database structure.  The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based  Secure DBaaS provides several original features that differentiate it from previous work in the field of security for remote database services. ADVANTAGES OF PROPOSED SYSTEM:  The proposed architecture does not require modifications to the cloud database, and it is immediately applicable to existing cloud DBaaS, such as the experimented PostgreSQL Plus Cloud Database, Windows Azure and Xeround .  There are no theoretical and practical limits to extend our solution to other platforms and to include new encryption algorithm.  It guarantees data confidentiality by allowing a cloud database server to execute concurrent SQL operations (not only read/write, but also modifications to the database structure) over encrypted data.  It provides the same availability, elasticity, and scalability of the original cloud DBaaS because it does not require any intermediate server. Contact: 9703109334, 9533694296 solutions. Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in