Skip to main content

Independent and Distributed Access to Encrypted Cloud Databases

  • Conference paper
  • First Online:
Computational Intelligence in Information Systems (CIIS 2018)

Abstract

The present generation prefers to store their data in the cloud, which brings them mobility and ease of extracting data from any device to anywhere in the world. Since data in the cloud is going to be placed online, it is important that these data in the clouds are well secured. The most important security challenge with data in the clouds is that the client was not aware of where the data is stored. Which may be preyed on by 3rd party clients or attackers. The data should be accessible solely by trustworthy parties that don’t embrace cloud suppliers and hence information should be encrypted. We propose Secure DBaaS architecture because this enables cloud tenants to acquire full advantage of DBaaS qualities, like accessibility, scalability and reliability, while not exposing unencrypted information to the cloud supplier.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, D., Rosen, D.W., Wang, L., Schaefer, D.: Cloud-based design and manufacturing: a new paradigm in digital manufacturing and design innovation. Comput.-Aided Des. 59, 1–14 (2015)

    Article  Google Scholar 

  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  3. Venkata, R.N., Nagesh, P., Soni, L., Karri, R.R.: Big Data Analytics and IoT gadgets for Tech savvy Cities. Advances in Intelligent Systems and Computing (2018)

    Google Scholar 

  4. Chang, V., Kuo, Y.H., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Futur. Gener. Comput. Syst. 57, 24–41 (2016)

    Article  Google Scholar 

  5. Madhavi, R., Karri, R.R., Sankar, D.S., Nagesh, P., Lakshminarayana, V.: Nature inspired techniques to solve complex engineering problems. J. Ind. Pollut. Control 33(1), 1304–1311 (2017)

    Google Scholar 

  6. Lanka, S., Karri, R.R., Prasad, R.P.V.G.D., Peri, S.R.: Data mining, image processing and pattern recognition for bio-medical informatics. In: 4th Biotechnology World Congress, vol. 1(01), pp. 214–215 (2016)

    Google Scholar 

  7. Venkata, R.N., Seravana, K.P.V.M., Puvvada, N.: Analytic architecture to overcome real time traffic control as an intelligent transportation system using big data. Int. J. Eng. Technol. 7(2.18), 7–11 (2018)

    Google Scholar 

  8. Venkata, R.N., Puvvada, N., Seravana, K.P.V.M., Vignesh, U.: IoT Based Scientific design to conquer constant movement control as a canny transportation framework utilizing huge information available in Cloud Networks. J. Adv. Res. Dyn. Control. Syst. 10(07-Special Issue) (2018)

    Google Scholar 

  9. Ali, M., Samee, U.K., Athanasios, V.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  10. Kevin, H., Murat, K., Latifur, K., Bhavani, T.: Security issues for cloud computing. Int. J. Inf. Secur. Priv. 4(2), 39–51 (2010)

    Google Scholar 

  11. Lanka, S., Madhavi, M.R., Abusahmin, B.S., Puvvada, N., Lakshminarayana, V.: Predictive data mining techniques for management of high dimensional big-data. J. Ind. Pollut. Control 33, 1430–1436 (2017)

    Google Scholar 

  12. Karri, R.R., Sahu, J.N.: Modeling and optimization by particle swarm embedded neural network for adsorption of zinc (II) by palm kernel shell based activated carbon from aqueous environment. J. Environ. Manage. 206, 178–191 (2018)

    Article  Google Scholar 

  13. Luca, F., Michele, C., Mirco, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2) (2014)

    Google Scholar 

  14. Karri, R.R., Venkateswarlu, Ch.: Nonlinear model based control of complex dynamic chemical systems. J. Adv. Chem. Eng. Res. 2(1), 1–19 (2013)

    Google Scholar 

  15. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: 41st Annual ACM Symposium on Theory of Computing, May 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rama Rao Karri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krishna, M., Chaitanya Deepthi, K., Lanka, S., Rani Bandlamudi, S.B.P., Karri, R.R. (2019). Independent and Distributed Access to Encrypted Cloud Databases. In: Omar, S., Haji Suhaili, W., Phon-Amnuaisuk, S. (eds) Computational Intelligence in Information Systems. CIIS 2018. Advances in Intelligent Systems and Computing, vol 888. Springer, Cham. https://doi.org/10.1007/978-3-030-03302-6_10

Download citation

Publish with us

Policies and ethics