Visible to the public "Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"Conflict Detection Enabled

Title"Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"
Publication TypeConference Paper
Year of Publication2015
AuthorsV. Waghmare, K. Gojre, A. Watpade
Conference Name2015 International Conference on Computational Intelligence and Communication Networks (CICN)
Date PublishedDec
PublisherIEEE
ISBN Number978-1-5090-0076-0
Accession Number16248174
KeywordsAdvance Encryption Standard, cloud computing, cloud database, commerce, concurrency (computers), concurrent access, confidentiality, cryptography, customer services, database installation, database management, database-as-a-service, Distributed databases, Encryption, encryption algorithm, Master key, meta data, metadata, metadata storage, multiple business, multiple geographically distributed clients, power station, Protected Database-as-a-Service, pubcrawl170105, security, self-reliant access, Servers, storage management
Abstract

Now a day's cloud computing is power station to run multiple businesses. It is cumulating more and more users every day. Database-as-a-service is service model provided by cloud computing to store, manage and process data on a cloud platform. Database-as-a-service has key characteristics such as availability, scalability, elasticity. A customer does not have to worry about database installation and management. As a replacement, the cloud database service provider takes responsibility for installing and maintaining the database. The real problem occurs when it comes to storing confidential or private information in the cloud database, we cannot rely on the cloud data vendor. A curious cloud database vendor may capture and leak the secret information. For that purpose, Protected Database-as-a-service is a novel solution to this problem that provides provable and pragmatic privacy in the face of a compromised cloud database service provider. Protected Database-as-a-service defines various encryption schemes to choose encryption algorithm and encryption key to encrypt and decrypt data. It also provides "Master key" to users, so that a metadata storage table can be decrypted only by using the master key of the users. As a result, a cloud service vendor never gets access to decrypted data, and even if all servers are jeopardized, in such inauspicious circumstances a cloud service vendor will not be able to decrypt the data. Proposed Protected Database-as-a-service system allows multiple geographically distributed clients to execute concurrent and independent operation on encrypted data and also conserve data confidentiality and consistency at cloud level, to eradicate any intermediate server between the client and the cloud database.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7546201&isnumber=7546033
DOI10.1109/CICN.2015.158
Citation Key7546201