Preserving Data Confidentiality Using Multi-cloud Architecture

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Confidentiality using Fragmentation in Cloud Computing

Data confidentiality is one of the pressing challenges in the ongoing research in Cloud computing. Hosting confidential business data at a Cloud Service Provider (CSP) requires the transfer of control over the data to a semi-trusted external service provider. Existing solutions to protect the data mainly rely on cryptographic techniques. However, these cryptographic techniques add computational...

متن کامل

Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption

Confidentiality and privacy of outsourced data has become one of the pressing challenges in Cloud computing. Outsourced data often includes sensitive personally identifiable information. When data is outsourced, sensitive information will not be under the control of its owners, but under the control of an external service provider. In this paper, we define an approach allowing the protection of...

متن کامل

Cloud Data Patterns for Confidentiality

Cloud computing enables cost-effective, self-service, and elastic hosting of applications in the Cloud. Applications may be partially or completely moved to the Cloud. When hosting or moving the database layer to the Cloud, challenges such as avoidance of disclosure of critical data have to be faced. The main challenges are handling different levels of confidentiality and satisfying security an...

متن کامل

Preserving Data Confidentiality and Query Privacy Using KNN-R Approach

Cloud computing is one of the famous and well known technique that processes the data query efficiently. Since it is maintaining huge amount of resources, its privacy and security is an issue. Cloud service providers are not trust worthy, so data is to be secured. Whenever the data is sent to the cloud, it is encrypted because to protect the sensitive data such that query privacy and data confi...

متن کامل

Practical Confidentiality Preserving Big Data Analysis

The “pay-as-you-go” cloud computing model has strong potential for efficiently supporting big data analysis jobs expressed via data-flow languages such as Pig Latin. Due to security concerns — in particular leakage of data — government and enterprise institutions are however reluctant to moving data and corresponding computations to public clouds. We present Crypsis, a system that allows execut...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2015

ISSN: 1877-0509

DOI: 10.1016/j.procs.2015.04.035