Accessing the Encrypted Cloud Data in a Simultaneous, Independent and Role-Based Fashion
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Sharvari A. Pawar; Suresh B. Rathod;
Page : 2221-2224
Keywords : Cloud computing; Cloud Security; Confidentiality; RBA;
Abstract
In todays tech-savvy globalized world where ample data is available over a single click; its storage is a concern. A solution to this is the use of cloud where large amount of data can be stored. The feasibility and usefulness has made cloud computing a popular and rapidly growing field. But placing vital and confidential data outside the premises of an organization and in hands of cloud providers should come with guarantee that our data should be secure and available at any point of time. Many cyber threats are observed in cloud, due to lack of security awareness. To overcome these cyber trials in cloud, we have proposed an architecture, in which data is encrypted and then stored. There are many data storage techniques available, but we are trying to combine cloud database service along with data security and also can perform independent and concurrent operations on encrypted data. The client can perform certain basic SQL operations on the database in cloud. Apart from independence and concurrent access to this encrypted data, we also provide role based access to this data i. e data access will differ from person to person in an organization according to its designation.
Other Latest Articles
- Privacy-Preserving Mining of Association Rules in Cloud
- A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator
- Multi Channels Digital Electrotherapy for Acupuncture DC-12
- A Survey of Generating Multi-Document Summarizations
- FPGA Implementation of Motion Feature Extraction Employing Pipelined Architecture
Last modified: 2021-06-30 21:12:54