What makes an Enterprise NoSQL database different from Non-Enterprise is the way it handles enterprise-class and enterprise scale application. Enterprise NoSQL needs to be secure because security of the modern enterprise is built in such a way that it does not allow user, as well as developers, access to data
Cloud Computing Challenges and Concerns Dazhi Zhang Abstract Cloud computing is an internet-based storage and management computer. It is a flexible, efficient, economic, environment friendly IT technology. For these advantages and the big business value of cloud computing, thousands of companies and institutions in different industries have begun to use cloud computing technology. For the widely use of cloud computing, now we are in the age of cloud computing. How to deal with its challenges has become a problem we are feeling obliged to face, especially the security issues. This research paper will first describe some characteristics and definitions of cloud computing. In section two, I will show two kinds of patterns of cloud computing,
II. RELATED WORK Cloud Computing has many threats which are disturbing gigantic acceptance of cloud. Major threats that affect data integrity and privacy in cloud storage. In order to reduce this type of threats in cloud many researches are going on.
: Cloud computing is the well-known model used for storing huge amount of data over the internet and provides the convenient mechanisms to access the information. Since it is keeping up enormous measures of assets, its protection and security are the major issues. The cloud administration suppliers are not trusted and unethical, so information is to be secured. Still, some information might be accessible that the data proprietor does not wish for progress data to the cloud unless query confidentiality and data privacy are assured. On the other hand, protected query processing services have to grant efficient query processing and drastically reduce the internal workload to fully understand the benefits. “Random space perturbation (RASP) processing” method provides security and various query processing services to provide confidentiality in the cloud. The (K-Nearest Neighbour) KNN-R algorithm is used here to convert the range query to the KNN query. Users have been certified by using the randomly generated key value provided by the administrator subsequent to successful registration by the client thus maintaining privacy. Queries from users are retrieved within the least period of time i.e., less than a second. In future using RASP statistics and KNN queries to investigate supplementary applications of RASP perturbation for protected data concentrated computing in the cloud.
• Sematic Search Engine in Cloud: The digital era facilitated the information production and changed completely the storage mean of documents from paper to electronic. The
Cloud services exhibits of online file storage, social networking sites, web mail and online business applications. These are the services which changed the face of networking. By this facility we can upload,
Cloud computing has become the most common phenomenon in the recent years. More and more cloud services have flourished all around the world such as computing resource, storage space outsourcing and different kinds of software applications. For many reasons like low cost, efficiency, convenience, better connectivity and etc., user often stores his data on remote servers. Since more servers are public, there exist a lot of risks for the data in the transition process, the user ensures the privacy of his data by storing it in encrypted form, then he can search the encrypted data and retrieve it. The first effort of searching encrypted data by keyword was tackled by Song, Wagner and Perrig cite{s1}. To securely search over encrypted data, searchable encryption schemes have been proposed in recent years cite{b2,b3,b5,c2,c4,g1,w2}, which can be divided into two schemes: symmetric searchable encryption (SSE) and asymmetric searchable encryption (ASE). To perform a search on a dataset, an user creates an index of keywords listed in the documents and later on executes the search on the index in a way that allows the server to retrieve the documents contain a certain keyword instead of retrieving all the encrypted documents back which is fully impractical solution in cloud computing scenarios. Recent refinements and extensions to this scheme are given in cite{g1, w2}.
Middleware framework for Streaming data Online Stock market data has taken as streaming data for experimentation. Web produces continuous stream of data through online financial trading. Streaming data has collected in the form of web interface. Timestamp is embedded with incoming data. Current Timestamp and change in value
Framework to enhance security of data in private cloud using multiple algorithms in AWS CHAPTER 1: INTRODUCTION 1.1 Introduction of Cloud Computing “In recent 10 years, Internet has been developing very quickly. The cost of storage, the power consumed by computer and hardware is increasing. The storage space in data center can’t meet our
ABSTRACT Cloud is simply a vast storage area to store data. The data stored is confidential. Cloud storage is a model of data storage where the data is stored in logical pools, and the physical storage spans multiple servers and often locations, and the entire physical environment is typically managed and owned by a enterprise or large company.
This is most likely to exceed the time limit and hence the client will know that the server is not storing their files is a secure manner.
To study a system which will help to secure data stored on the cloud storage system. This system may be helpful to for users who wants secure thier data as well as for companies who wants to give access permission to limited data to their employees and secure their data in cloud storage system.
2 Assistant Professor, Department of Computer Science & Engineering, Maharashtra Institute of Technology (MIT), Aurangabad, Maharashtra, India
With the fast computers and signal processors available in the 2000s, cloud computing become the most common form of data storage and generally, is used because it is not only the most versatile method, but also the cheapest.
CHAPTER 1 INTRODUCTION Cloud storage system is a service model in which data are managed , maintained, and backuped remotely on the cloud side, and simultaneously keeps data available to the users over a network. Mobile Cloud Storage (MCS) [1], [2] represents a family of increasingly popular on-line services, and even is used as primary file storage for the mobile devices [3]. MCS helps the mobile device users to store and retrieve files or data on the cloud through wireless communication, which improves the data availability and facilitates the file sharing process without drawing off the local mobile device resources [4].