DocumentCode :
3579140
Title :
Unique authentic approach for control list based global sharing
Author :
Vidhya, P. ; Raghavendra, A.P.V.
Author_Institution :
Computer Science and Engineering, V.S.B Engineering College, Tamilnadu, India
fYear :
2014
Firstpage :
1
Lastpage :
4
Abstract :
Generally, the information is stored in the database. Protecting sensitive information is encrypted before outsourcing to a service provider. We send the request to service provider through SQL queries. The query expressiveness is limited by means of any logarithmic approach of cryptographically deployed, for querying with respect to server, working with processed data. Data sharing in the service provider is emerging as a promising technique for allowing users to access data. The growing number of customers, who stores their data in service provider, is increasingly challenging the users´ privacy and the security of data. The outsourced and trust worthy database along with the concern prototype, allows the clients to execute the compliance constraints. Interfere-proof believed the supportive physical equipment in crucial process levels, the limits within the required queries. It focuses on providing a dependable and secure data sharing service that allows users dynamic access to their information. The trust worthy database was finally built and executed on hardware, and its performance increase was noted.
Keywords :
Cryptography; Hardware; Privacy; Query processing; Servers; Interfere-proof; Trust worthy database; cryptographically deployed; logarithmic approach;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on
Print_ISBN :
978-1-4799-3974-9
Type :
conf
DOI :
10.1109/ICCIC.2014.7238386
Filename :
7238386
Link To Document :
بازگشت