ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Analysis of Data Confidentiality Techniques in Cloud Computing?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 3)

Publication Date:

Authors : ;

Page : 169-175

Keywords : Cloud computing; Data Confidentiality; Integrity; Outsourced Databases; Performance;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud Computing is one of the emerging technologies in Computer Science. Cloud provides various types of services to us. Database Outsourcing is a recent data management paradigm in which the data owner stores the confidential data at the third party service provider’s site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database. There are chances of hampering the security of the data due to untrustworthiness of service provider. So, to secure the data which is outsourced to third party is a great challenge. The major requirements for achieving security in outsourced databases are confidentiality, privacy, integrity, availability. To achieve these requirements various data confidentiality mechanisms like fragmentation approach, High-Performance Anonymization Engine approach etc. are available. In this paper, various mechanisms for implementing Data Confidentiality in cloud computing are analyzed along with their usefulness in a great detail.

Last modified: 2014-03-13 23:55:10