Volume- 3
Issue- 3
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Sharayu Anap
Cloud technology provides data storage services to users to store large amount of data and also provides services that perform data processing. While data comes from different servers on cloud and the processing of the data is again done on different server, users must be assured about the integrity of the query results. Various applications need to perform the join operation on the data fetched from different data storage servers and send the join result to the client. The integrity methods described provide a way for the user to verify whether query results obtained after retrieving data are correct that no valid data is missing. Integrity check ensures that the data is complete and authentic. Encryption provides data protection for the query results.
[1] H. Hacigu ¨mu ¨s, B. Iyer, and S. Mehrotra, “Providing Database As a Service,” Proc. 18th Int’l Conf. Data Engineering (ICDE ’02), Feb. 2002
[2] Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis, “Authenticated Join Processing in Outsourced Databases,” Proc. ACM Int’l Conf. Management of Data (SIGMOD ‘09), June/July 2009.
[3] M. Xie, H. Wang, J. Yin, and X. Meng, “Integrity Auditing of Outsourced Data,” Proc. 33rd Int’l Conf. Very Large Data Bases (VLDB ‘07), Sept. 2007.
[4] A. Ceselli, E. Damiani, S.De Capitani di Vimeecati, S. Jajodia, S. Paraboschi, ad P. Samarati, “Modelling and Assessing Inference Exposure in Encrypted Databases,” ACM Trans. Information and System Security, vol. 8, no. 1 , pp. 119-152, Feb. 2005.
[5] S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P.Samarati, “Integrity for Join Queries in the Cloud”, IEEE Trans. Cloud Computing, vol. 1, no. 2, pp. 187-200, Dec.2013.
[6] S. De Capitani diVimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Encryption Policies for Regulating Access to Outsourced Data,” ACM Trans. Database Systems, vol. 35, no. 2, Apr. 2010.
[7] E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication and Integrity in Outsourced Databases,” ACM Trans. Storage, vol. 2, no. 2, pp. 107-138, May 2006.
[8] D. Kossmann, T. Kraska, and S. Loesing, “An Evaluation of Alternative Architectures for Transaction Processing in the Cloud,” Proc. ACM Int’l Conf. Management of Data (SIGMOD ’10), June 2010.
[9] H. Pang, A. Jain, K. Ramamritham and K. Tan, “Verifying Completeness of Relational Query Results In Data Publishing,” Proc. ACM Int’l Conf. Management of Data (SIGMOD ’05), June 2005.
[10] C. Curino et al., “Relational Cloud: A Database Service for the Cloud,” Proc. Fifth Biennial Conf. Innovative Data Systems Research (CIDR ’11), Jan. 2011.
[11] Jairam Chandar, “Join Algorithms using Map/Reduce”, Masters thesis submitted, school of Computer Science School of Informatics,University of Edinburgh, 2010
[12] http://searchcloudcomputing.techtarget.com/definition/cloud-computin g
Department of Computer Engineering, MET’s IOE, BKC; Savitribai Phule Pune University, Pune, Maharashtra, India
No. of Downloads: 6 | No. of Views: 1015