Compact Directory for Protected - Based Security with Remoteness and Data Privacy

Authors

  • Paswan HK UG Scholar, Depatement of CSE, Bharath Univerity, Chennai-73, Tamilnadu, India
  • kumar D UG Scholar, Depatement of CSE, Bharath Univerity, Chennai-73, Tamilnadu, India
  • Sriram UG Scholar, Depatement of CSE, Bharath Univerity, Chennai-73, Tamilnadu, India

Keywords:

Database architectures, security, privacy, special-purpose hardware

Abstract

Most data systems and business applications designed today have an online front end and that they got to be universally obtainable to purchasers, workers and partners round the world, because the digital economy is changing into additional and additional rife within the world economy. These net applications, which may be accessed from anyplace, become therefore wide exposed that any existing security vulnerability can most likely be uncovered and exploited by hackers. Trusted DB is an outsourced information example that enables purchasers to execute SQL queries with privacy and beneath regulative compliance constraints while not having to trust the service supplier. Trusted DB achieves this by investing server-hosted tamper-proof trustworthy hardware in crucial question. SQL Queries enable attackers to access unauthorized information (read, insert, modification or delete), gain access to privileged information accounts.

References

. G. Aggarwal, M. Bawa, P. Ganesan, H. GarciaMolina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu, “Two Can Keep a Secret: A Distributed Architecture for Secure Database Services,” Proc. Conf. Innovative Data Systems Research (CIDR), pp. 186-199, 2005.

. Iliev and S.W. Smith, “Protecting Client Privacy with Trusted Computing at the Server,” IEEE Security and Privacy, vol. 3, no. 2, pp. 20-28, Mar./Apr. 2005. M. Bellare, “New Proofs for NMAC and HMAC: Security Without Collision-Resistance,” Proc. 26th Ann. Int’l Conf. Advances in Cryptology, pp. 602- 619, 2006.

. Bhattacharjee, N. Abe, K. Goldman, B. Zadrozny, C. Apte, V.R. Chillakuru, and M. del Carpio, “Using Secure Coprocessors for Privacy Preserving Collaborative Data Mining and Analysis,” Proc. Second Int’l Workshop Data Management on New Hardware (DaMoN ’06), 2006.

. M. Canim, M. Kantarcioglu, B. Hore, and S. Mehrotra, “Building Disclosure Risk Aware Query Optimizers for Relational Databases,” Proc. VLDB Endowment, vol. 3, nos. 1/2, pp. 13-24, Sept. 2010.

. Y. Chen and R. Sion, “To cloud or Not to loud?: Musings on Costs and Viability,” Proc. Second ACM Symp. Cloud Computing (SOCC ’11), pp. 29:1-29:7, 2011.

. V. Ciriani, S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Combining Fragmentation and Encryption to Protect Privacy in Data Storage,” ACM Trans. Information and System Security, vol. 13, no. 3, pp. 22:1-22:33, July 2010.

. T. Denis, Cryptography for Developers, Syngress, 2007.

Downloads

Published

2024-02-26

How to Cite

Paswan, H. K., Kumar, D., & Sriram. (2024). Compact Directory for Protected - Based Security with Remoteness and Data Privacy. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(04), 1637–1641. Retrieved from https://ijact.in/index.php/j/article/view/287

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.