In this abstract proposed a novel SecureDBaaS architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. It guarantees data confidentiality by allowing a cloud database server to execute concurrent SQL operations (not only read/write, but also modifications to the database structure) over encrypted data. It […]
FEDERATION OF SELFISH CLOUD PROVIDERS USING CAPACITY SHARING STRATEGY
One of the major problems that face the cloud providers (CPs) is the uncertainty in their work-loads; a spike in the requested VMs may result in higher service rejection rates and experienced delays by clients due to congested resources. A straightforward solution to overcome this problem is to over-provision the available resources to be able […]
CAPACITY SHARING STRATEGY IN A FEDERATION OF SELFISH CLOUD PROVIDERS
Federated clouds approach the CP problem by allowing peer CPs to share their unused capacities during low-demand periods and borrow spare capacity during peaks to maximize their profits and enhance their clients’ experience, with several strategies for capacity sharing in the federation. The proposed work models the interactions among the CPs as a repeated game […]
AUTHORIZED DUPLICATE CHECK SCHEME USING HYBRID CLOUD APPROACH
To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. Deduplication can take place at either the file level or the block level. For file-level deduplication, it eliminates duplicate copies of the same file. Deduplication can also take place at the block […]
BACK-PROPAGATION NEURAL NETWORK LEARNING ALGORITHM FOR PRIVACY PRESERVING IN CLOUD COMPUTING
Back -Propagation is an effective method for learning neural networks and has been widely used in various applications. The accuracy of the learning result, despite other facts, is highly affected by the volume of high-quality data used for learning. As compared to learning with only local data set, collaborative learning improves the learning accuracy by […]
BPN LEARNING MADE PRACTICAL WITH CLOUD COMPUTING FOR PRIVACY PRESERVING
To protect each participant’s private data set and intermediate results generated during the BPN network learning process, it requires secure computation of various operations, for example, addition, scalar product, and the nonlinear sigmoid function, which are needed by the BPN network algorithm; Back -Propagation is an effective method for learning neural networks and has been […]
Two-Phase Validation Commit Protocol for Secure Cloud Transaction
This work proposes a Two-Phase Validation Commit (2PVC) protocol that ensures that a transaction is safe by checking policy, credential, and data consistency during transaction execution. This paper defines several different levels of policy consistency constraints and corresponding enforcement approaches that guarantee the trustworthiness of transactions executing on cloud servers. 2PVC can be used to […]
ABE AND ABS SCHEME FOR DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
Cloud computing is computing in which large groups of remote servers are networked to allow the centralized data storage, and online access to computer services or resources. Clouds can be classified as public, private or hybrid. We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In […]
TWO-PHASE VALIDATION COMMIT PROTOCOL BASED SECURE CLOUD TRANSACTIONS
Formalize the concept of trusted transactions. Trusted transactions are those transactions that do not violate credential or policy inconsistencies over the lifetime of the transaction. We then present a more general term, safe transactions, that identifies transactions that are both trusted and conform to the ACID properties of distributed database systems. We define several different […]
SECURE DATA STORAGE USING DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION IN CLOUD
In this proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored […]