scholarly journals Performance Evaluation of Cloud Database Security Algorithms

2021 ◽  
Vol 309 ◽  
pp. 01189
Author(s):  
Srinu Banothu ◽  
A Govardhan ◽  
Karnam Madhavi

Cloud computing is a group of servers providing the on demand computing services to the users on rental basis. One of the services providing by the cloud is Data Storage as a Service. In Data Storage as a Service user will outsource their sensitive data to cloud storage environment, where the users data will be stored and whenever user needs data, they will access from the cloud storage from anywhere and anytime using any device connected to the internet. One of the critical issues in this is data security. When user outsources their sensitive data to cloud vendor, the cloud vendor may leak the user’s sensitive data to third persons because vendor is not a trusted party. To overcome these problems there are many authors suggested different security algorithms. In this research we studied and evaluating the performances of those security algorithms and proposing a better solution, which provides best security to data stored in cloud databases.

In the cryptocurrency era, Blockchain is one of the expeditiously growing information technologies that help in providing security to the data. Data tampering and authentication problems generally occur in centralized servers while sharing and storing the data. Blockchain provides the platform for big data and cloud storage in enhancing the security by evading from pernicious users. In this paper, we have discussed the exhaustive description of blockchain and its need, features and applications. Analysis of blockchain is done for different domains such as big data, cloud, internet of things and mobile cloud where the differences V’s are compared with big data and blockchain. SWOT (Strength Weakness Opportunities Threats) analysis is performed to address the merits and limitations in blockchain technology. The survey in aspects of data security, data storage, data sharing and data authentication through blockchain technology is done and the challenges are discussed to overcome the problem that leads in big data and cloud storage. The detailed comparative analysis proves that the blockchain technology overcomes the problems in big data storage and data security in cloud.


Respati ◽  
2019 ◽  
Vol 14 (1) ◽  
Author(s):  
M. Fairul Filza

INTISARITeknologi basis data adalah komponen inti dari banyak sistem komputasi. Basis data memungkinkan data yang akan disimpan dan berbagi secara elektronik. Begitu pula kebutuhan untuk memastikan integritas data dan keamanan data dari akses yang tidak diinginkan. Keamanan basis data dibuktikan dengan peningkatan jumlah kekhawatiran dan insiden kehilangan atau pelanggaran dilaporkan terhadap data yang sensitif. Penelitian ini membahas secara teknis pengamanan dalam pengambilan kembali data pada lapisan datasource dengan enkripsi simetris. Hasil dari penilitian ini adalah pembuatan virtual dan mengkamuflase tabel sehingga ketika diakses oleh penguna publik akan menampilkan rekaman data yang terenkripsi. ABSTRACTData base technology is a core component of many computing systems. The database allows data to be stored and shared electronically. Similarly, the need to ensure data integrity and data security from unwanted access. Database security is evidenced by the increasing number of concerns and incidents of loss or breach is reported against sensitive data. This study discusses the technical safeguards in taking back the data on the layer of the datasource with symmetric encryption. The result of this was the creation of a virtual and camouflage tables when accessed by users so that the public will display the encrypted data records.Keyword —  Cryptography, Data Security, Aes, Postgesql, Python, RDBMS


2019 ◽  
Vol 16 (3) ◽  
pp. 797-813
Author(s):  
Qiuting Tian ◽  
Dezhi Han ◽  
Yanmei Jiang

With the development of cloud storage technology, data storage security has become increasingly serious. Aiming at the problem that existing attribute-based encryption schemes do not consider hierarchical authorities and the weight of attribute. A hierarchical authority based weighted attribute encryption scheme is proposed. This scheme will introduce hierarchical authorities and the weight of attribute into the encryption scheme, so that the authorities have a hierarchical relationship and different attributes have different importance. At the same time, the introduction of the concept of weight makes this scheme more flexible in the cloud storage environment and enables fine-grained access control. In addition, this scheme implements an online/offline encryption mechanism to improve the security of stored data. Security proof and performance analysis show that the scheme is safe and effective, and it can resist collusion attacks by many malicious users and authorization centers. It is more suitable for cloud storage environments than other schemes.


Author(s):  
Dr. Ramalingam Sugumar ◽  
Sharmila Banu Sheik Imam ◽  

2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


Author(s):  
Jens Kohler ◽  
Kiril Simov ◽  
Thomas Specht

Cloud Computing becomes interesting for enterprises across all branches. Renting computing capabilities from external providers avoids initial investments, as only those resources have to be paid that were used eventually. Especially in the context of “Big Data” this pay-as-you-go accounting model is particularly important. The dynamically scalable resources from the Cloud enable enterprises to store or analyze these huge amounts of unstructured data without using their own hardware infrastructure. However, Cloud Computing is currently facing severe data security and protection issues. These challenges require new ways to store and analyze data, especially when huge data volumes with sensitive data are stored at external locations. The presented approach separates data on database table level into independent chunks and distributes them across several clouds. Hence, this work is a contribution to a more secure and resilient cloud architecture as multiple public and private cloud providers can be used independently to store data without losing data security and privacy constraints.


2020 ◽  
Vol 17 (4) ◽  
pp. 1590-1594
Author(s):  
V. Sathya ◽  
A. Shiny ◽  
S. Sajid Hussain ◽  
Ashutosh Gauda

Cloud computing is the movement of enlisting computing services like organization servers, accumulating databases, arranging, programming examination over the Internet. Companies offering these computing services are known as cloud providers and typically charge for cloud computing services based on usage, similar to how you are billed for water or electricity at home. It enables the companies to consume a compute resource, such as a Virtual Machine (VM), storage or an application, as a utility—just like electricity—rather than building and maintaining large computing materials in the house. Though servers are greatly protected against unauthorized access, there are incidents where classified data stored on servers are accessed by the maintenance staffs. So, the security plays a major role in cloud storage as when the user stores the data in the cloud, it stays there and anybody accessing it cannot be known at all. Hence, this paper mainly deals with the idea of storing data securely in the cloud using Symmetric and Asymmetric Cryptography algorithms including AES, 3DES, Blowfish, RSA along with modern Steganography LSB algorithm for wireless communication which hides the key inside the cover image.


2014 ◽  
Vol 912-914 ◽  
pp. 1160-1163
Author(s):  
Ning Wang

Cloud computer technology is one of current hot areas of the development of the information technology, and the data storage service based on the cloud is developing rapidly, which makes more and more enterprises and individuals enjoy the efficiency, convenience as well as low cost supplied by cloud storage. However, at the same time, the security problem of cloud storage arouses users' attention. This paper firstly expounds the basic information and system of cloud storage, then analyses the status quo of the development of cloud storage, and finally offers some preventive strategies based on cloud storage security.


Author(s):  
Dr. Nikhat Akhtar ◽  
Dr. Bedine Kerim ◽  
Dr. Yusuf Perwej ◽  
Dr. Anurag Tiwari ◽  
Dr. Sheeba Praveen

People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.


Sign in / Sign up

Export Citation Format

Share Document