• Corpus ID: 29116739

Confidentiality of Database for Secure Information in Cloud Computing Using Table Collide Storage Model

@inproceedings{Thilagam2016ConfidentialityOD,
  title={Confidentiality of Database for Secure Information in Cloud Computing Using Table Collide Storage Model},
  author={Dr. K. Thilagam and S. Lakshmi Priya},
  year={2016}
}
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Since the data transmission on the internet or over any networks is vulnerable to attack, privacy preservation and data integrity have become two of the most… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 40 REFERENCES
Cloud Computing Data Storage and Security Enhancement
TLDR
This paper proposes a method for providing data storage and securing data in cloud computing system using RSA algorithm, and in this algorithm some important security services including key generation, encryption and decryption are provided in cloud Computing system.
A Secured Cost Effective Multi-Cloud Storage in Cloud Computing
TLDR
A secured cost-effectivemulti-cloud storage (SCMCS)model in cloud computing which holds an economical distribution of data among the available Service Providers in the market, to provide customers with data availability as well as secure storage.
Cloud Computing Security Issues and Challenges
TLDR
A detailed analysis of the cloud Computing security issues and challenges focusing on the cloud computing types and the service delivery types is introduced.
An analysis of security issues for cloud computing
TLDR
This work identifies the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.
Security threats and solutions in cloud computing
  • Hanim Eken
  • Computer Science
    World Congress on Internet Security (WorldCIS-2013)
  • 2013
TLDR
This paper identifies security threats focused on cloud computing which is an essential part of the companies that want to use cloud computing services and provides some solutions about security threats for enterprise and service provider for the cloud computing deployment in order to provide the security of information.
Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance
TLDR
This book, written by recognized authorities in the tech security world, addresses issues that affect any organization preparing to use cloud computing as an option and provides the detailed information on cloud computing security that has been lacking, until now.
Addressing cloud computing security issues
iPrivacy: a Distributed Approach to Privacy on the Cloud
TLDR
An approach where confidential data is stored in a highly distributed database, partly located on the cloud and partly on the clients, and data is shared in a secure manner using a simple grant-and-revoke permission of shared data.
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
TLDR
The inter-cloud communication protocol is described, the formal model, security analysis, and simulation results, and results show how a Redundant Array of Independent Net-storages (RAIN) can be deployed for confidentiality control in Cloud Computing.
Cloud Computing: State of the Art and Security Issues
TLDR
This paper focuses on the various concepts related to cloud computing, its various business and service models and its entities along with several issues and challenges related to it.
...
...