SlideShare a Scribd company logo
Distributed, Concurrent, and Independent Access to 
Encrypted Cloud Databases 
ABSTRACT: 
Placing critical data in the hands of a cloud provider should come with the 
guarantee of security and availability for data at rest, in motion, and in use. Several 
alternatives exist for storage services, while data confidentiality solutions for the 
database as a service paradigm are still immature. We propose a novel architecture 
that integrates cloud database services with data confidentiality and the possibility 
of executing concurrent operations on encrypted data. This is the first solution 
supporting geographically distributed clients to connect directly to an encrypted 
cloud database, and to execute concurrent and independent operations including 
those modifying the database structure. The proposed architecture has the further 
advantage of eliminating intermediate proxies that limit the elasticity, availability, 
and scalability properties that are intrinsic in cloud-based solutions. The efficacy of 
the proposed architecture is evaluated through theoretical analyses and extensive 
experimental results based on a prototype implementation subject to the TPC-C 
standard benchmark for different numbers of clients and network latencies.
EXISTING SYSTEM: 
Original plain data must be accessible only by trusted parties that do not 
include cloud providers, intermediaries, and Internet; in any untrusted context, data 
must be encrypted. Satisfying these goals has different levels of complexity 
depending on the type of cloud service. There are several solutions ensuring 
confidentiality for the storage as a service paradigm, while guaranteeing 
confidentiality in the database as a service (DBaaS) paradigm is still an open 
research area. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Cannot apply fully homomorphic encryption schemes because of their 
excessive computational complexity. 
PROPOSED SYSTEM: 
 We propose a novel architecture that integrates cloud database services with 
data confidentiality and the possibility of executing concurrent operations on 
encrypted data. 
 This is the first solution supporting geographically distributed clients to 
connect directly to an encrypted cloud database, and to execute concurrent
and independent operations including those modifying the database 
structure. 
 The proposed architecture has the further advantage of eliminating 
intermediate proxies that limit the elasticity, availability, and scalability 
properties that are intrinsic in cloud-based solutions. 
 Secure DBaaS provides several original features that differentiate it from 
previous work in the field of security for remote database services. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The proposed architecture does not require modifications to the cloud 
database, and it is immediately applicable to existing cloud DBaaS, such as 
the experimented PostgreSQL Plus Cloud Database, Windows Azure and 
Xeround . 
 There are no theoretical and practical limits to extend our solution to other 
platforms and to include new encryption algorithm. 
 It guarantees data confidentiality by allowing a cloud database server to 
execute concurrent SQL operations (not only read/write, but also 
modifications to the database structure) over encrypted data.
 It provides the same availability, elasticity, and scalability of the original 
cloud DBaaS because it does not require any intermediate server. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, 
and Independent Access to Encrypted Cloud Databases”, IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 
25, NO. 2, FEBRUARY 2014.

More Related Content

DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
DOCX
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
DOCX
Distributed, concurrent, and independent access to encrypted cloud databases
DOCX
distributed, concurrent, and independent access to encrypted cloud databases
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
PDF
Concurrent And Independent Access To Encrypted Cloud Databases
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
DOC
Distributed, concurrent, and independent access to encrypted cloud databases
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
Distributed, concurrent, and independent access to encrypted cloud databases
distributed, concurrent, and independent access to encrypted cloud databases
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
Concurrent And Independent Access To Encrypted Cloud Databases
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Distributed, concurrent, and independent access to encrypted cloud databases

What's hot (16)

PDF
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
PPT
Distributed, concurrent, and independent access to encrypted cloud databases
DOCX
Secure cloud storage with data dynamic using secure network coding technique
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
DOCX
Toward secure and dependable
PDF
A hybrid cloud approach for secure authorized deduplication
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPTX
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
PPT
Privacy preserving public auditing for regenerating-code-based
DOCX
Cooperative provable data possession for
PPTX
A hybrid cloud approach for secure authorized deduplication.
PPTX
Provable multi copy dynamic data possession in cloud computing systems
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PDF
Privacy preserving public auditing for regenerating code based cloud storage
DOCX
A hybrid cloud approach for secure authorized deduplication
PDF
Secure distributed deduplication systems with improved reliability 2
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Distributed, concurrent, and independent access to encrypted cloud databases
Secure cloud storage with data dynamic using secure network coding technique
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Toward secure and dependable
A hybrid cloud approach for secure authorized deduplication
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
Privacy preserving public auditing for regenerating-code-based
Cooperative provable data possession for
A hybrid cloud approach for secure authorized deduplication.
Provable multi copy dynamic data possession in cloud computing systems
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
A hybrid cloud approach for secure authorized deduplication
Secure distributed deduplication systems with improved reliability 2
Ad

Similar to JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases (20)

DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
DOCX
distributed, concurrent, and independent access to encrypted cloud databases
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
PDF
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
PDF
A Security and Privacy Measure for Encrypted Cloud Database
PDF
An efficient concurrent access on cloud database using secureDBAAS
DOC
Integrity for join queries in the cloud
PPT
Secure Data Sharing in Cloud (SDSC)
PPTX
Saa s multitenant database architecture
PDF
Distrix_Software_Defined_Infrastructure_White_Paper
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PDF
Challenges Management and Opportunities of Cloud DBA
PDF
IRJET - A Secure Access Policies based on Data Deduplication System
PPTX
Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420
PDF
Enabling Integrity for the Compressed Files in Cloud Server
PPT
Ensuring d.s
DOCX
Providing user security guarantees in public infrastructure clouds
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
distributed, concurrent, and independent access to encrypted cloud databases
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
A Security and Privacy Measure for Encrypted Cloud Database
An efficient concurrent access on cloud database using secureDBAAS
Integrity for join queries in the cloud
Secure Data Sharing in Cloud (SDSC)
Saa s multitenant database architecture
Distrix_Software_Defined_Infrastructure_White_Paper
Ensuring data security in cloud computing. - Anusha Tuke
Challenges Management and Opportunities of Cloud DBA
IRJET - A Secure Access Policies based on Data Deduplication System
Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420
Enabling Integrity for the Compressed Files in Cloud Server
Ensuring d.s
Providing user security guarantees in public infrastructure clouds
Ad

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
DOCX
JPN1423 Stars a Statistical Traffic Pattern
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPN1423 Stars a Statistical Traffic Pattern
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification

Recently uploaded (20)

PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPT
Project quality management in manufacturing
PPTX
Construction Project Organization Group 2.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Artificial Intelligence
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
737-MAX_SRG.pdf student reference guides
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
PPT on Performance Review to get promotions
PPTX
web development for engineering and engineering
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CYBER-CRIMES AND SECURITY A guide to understanding
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
OOP with Java - Java Introduction (Basics)
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Project quality management in manufacturing
Construction Project Organization Group 2.pptx
Foundation to blockchain - A guide to Blockchain Tech
Internet of Things (IOT) - A guide to understanding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Model Code of Practice - Construction Work - 21102022 .pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Artificial Intelligence
Safety Seminar civil to be ensured for safe working.
737-MAX_SRG.pdf student reference guides
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPT on Performance Review to get promotions
web development for engineering and engineering
III.4.1.2_The_Space_Environment.p pdffdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...

JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

  • 1. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases ABSTRACT: Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.
  • 2. EXISTING SYSTEM: Original plain data must be accessible only by trusted parties that do not include cloud providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. Satisfying these goals has different levels of complexity depending on the type of cloud service. There are several solutions ensuring confidentiality for the storage as a service paradigm, while guaranteeing confidentiality in the database as a service (DBaaS) paradigm is still an open research area. DISADVANTAGES OF EXISTING SYSTEM:  Cannot apply fully homomorphic encryption schemes because of their excessive computational complexity. PROPOSED SYSTEM:  We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data.  This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent
  • 3. and independent operations including those modifying the database structure.  The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions.  Secure DBaaS provides several original features that differentiate it from previous work in the field of security for remote database services. ADVANTAGES OF PROPOSED SYSTEM:  The proposed architecture does not require modifications to the cloud database, and it is immediately applicable to existing cloud DBaaS, such as the experimented PostgreSQL Plus Cloud Database, Windows Azure and Xeround .  There are no theoretical and practical limits to extend our solution to other platforms and to include new encryption algorithm.  It guarantees data confidentiality by allowing a cloud database server to execute concurrent SQL operations (not only read/write, but also modifications to the database structure) over encrypted data.
  • 4.  It provides the same availability, elasticity, and scalability of the original cloud DBaaS because it does not require any intermediate server. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.
  • 5.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.