7 research outputs found

    Supporting Search-As-You-Type Using SQL in Databases

    Get PDF
    ABSTRACT : A search-as-you-type system determines answers while a user types a keyword query character by character. We study the search-as-you-type on data which is residing in a relational DBMS. We focus on native database language, SQL as how to support this type of search. A main challenge is how to make full use of existing database functionalities to meet the high-performance to achieve an interactive speed. Further we study how to use auxiliary indexes stored in the tables to increase the search performance. We present solutions for both multi keyword queries and singlekeyword queries, and develop novel techniques for the fuzzy search using SQL by allowing the mismatches between query keywords and answers. Since the volume of data increases day to day the real world, the searching process has become unvaried. The good search technique must be render the requested data in a stipulated time based on the user requested query. Using the native query language, i.e SQL to implement search-as-you-type reduces programming effort. Here we are providing user requested result based on the user previous search

    An Intelligent Technique for Framework and Security Issues Association in Multi Cloud Environment

    Get PDF
    Abstract-Cloud Computing is a recent technology which rapidly developing in area of information technology has the concern of the network. It provides a huge change in technology that Internet based computing, by which software, information and shared resources are provided to computers and the strategy on demand, like the grid of the electricity. Cloud computing is the product of the synthesis of traditional computing technology and network technology like parallel computing, distributed computing. The main goal of cloud computing is to construct a perfect system with powerful computing capability through a large number of relatively low cost computing entity using the advanced business models like SaaS, PaaS, IaaS to distribute the powerful computing capability to end users. Developers, Administrators, and Users have to make a decision about which environment is best suited for them. When we trying to compare such frameworks it is difficult because either users do not have access to all of them or they are comparing the performance of such systems on different resources that make it difficult to obtain objective comparisons. Hence virtualization of resources such as memory, network, processors and storage ensures scalability and high availability of computing capability. However clouds can dynamically provision these virtual resources to hosted applications or to clients that use them to develop their own applications or to store data. The rapid provisioning and dynamic reconfiguration of resources help to handle with variable demand and ensure optimum resource utilization. Proposed proxy-based multicloud computing framework allows dynamic, resource sharing and on the fly collaborations among cloud based services, policy and privacy issues, and addressing trust without pre established collaboration agreements

    An Etiquette Approach for Public Audit and Preserve Data at Cloud

    Get PDF
    Abstract-The purpose of Cloud Computing is a long dreamed vision of computing as a utility, where user want to store their data remotely into the cloud and so as to enjoy the on demand of high quality application and services for the shared pool of configurable computing storage of outsourcing data so users can be relieved from the burden about local storage and maintenance of data. However, in general the users have no longer physical possession of large size of outsourcing data makes data integrity protection in Clouding and a very challenging , potentially formidable task, this is for users especially with constrained resources and capabilities of cloud computing. And to enabling public availability of cloud stored data for security of critical importance of users and they can resort to an external third party to check the integrity of user outsourced data when user needed. To securely introduce an effective third party auditor (TPA), the following of two main requirements have to met: 1) TPA has to work efficiently to audit the cloud data storage without local copy of data demanding, and no need of additional on-line burden to the cloud user. 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper we combine the public key based HomoMorphic authenticate with random masking to achieve the privacypreserving public cloud data auditing system, for to meet all the above requirements

    Network Coding an Secure and Efficient Process for Content Distribution

    Get PDF
    Abstract-Content distribution in network sometimes may be vulnerable henceforth unauthorized users can inject "bogus" data to corrupt the content during its distribution process in order to deplete the network resource. The direct application of network coding may be insecure. Content verification is the important and practical issue when maintaining integrity of the content. While random linear networking coding is used, it is impracticable for the source of the content to sign all the data, and also the traditional methods such as "hash and sign" are no longer applicable. This is achieved by on the fly verification, which employs a classical homomorphic hash function. In this method content is spitted and hashing is applied. Hashed content is sent to the destination through peer to peer network. Key is sent to the destination directly from the source. Without the key unauthorized users finds difficult to modify the content. Hence the content is secured, however this technique is very complex to be applied to network coding because of high computational and communication overhead. We analyzing this issue further by carefully for different types of overhead, and we propose methods to reducing both communication and computational cost, and also to achieving that providing provable security at the same time

    A Secure Framework for Mollifying Attacks in Cloud

    Get PDF
    Abstract: The cloud computing becoming a major platform for storing the data from various organizations, instead of storing their data with them store in the cloud with this reducing the money as well as work load. We use computers to store and access the personal data as well as business information in the cloud. By this new communication and computing pattern new security issues will arise. The present data encryption techniques are not providing security from data hackers to theft the data. Especially those are performed by insider cloud provider. We introducing a new technique for providing security in the cloud, that's a decoy technique, means fault data. Always we will watch data access in the cloud, for detecting abnormal data access, when unauthorized user is noticed will ask some security questions for verifying, we will provide a large amount of decoy data to protect the original data from the attackers, Experiments accompanied in a local file setting provide proof that this method may provide unmatched levels of user data security in a Cloud environment

    A Novel Approach for Ensuring Data Integrity and Verification in the Cloud

    No full text
    Abstract: -To increase the security in cloud server and to maintain the data in secure form we are providing here a secured privacy based data sharing process in cloud servers. When user store his data will store directly in cloud servers for that user may face some of the problems in some times he may lost the data in server to avoid that all the things here we proposed the multi sharing copy concept over the cloud servers when user stores his files information in cloud server. And here in this when the third party user stores the data in cloud servers it will divided into multiple copies and that will store after the storing it will be decrypted by the cloud user and he can change the modification in server that will effect in the stored data then user can know that whenever he modify after at finally user can download the file

    Valid Key Exchange between Two Servers Password with High Reliability

    No full text
    Abstract-Password authentic key altercation (PAKE) remains anywhere a client and a server, who stocks a PIN, validate every additional and in the interim found a cryptographic pin through argument of mails. Now this situation, altogether the PIN essential towards to validate clients is deposited now unique server. Uncertainty the server is conceded, owing towards, lets us consider an example, equitation or flat insider bout, PINs put away in the server are altogether divulged. In this paper, we deliberate a situation any where dual servers collaborate towards validate a client and unknown single server is cooperated, the assailant motionless cannot imaginary towards remain the client through the info after the cooperated server. Existing explanations aimed at dual server Password authentic key altercation are whichever symmetric now the intelligence that dual viscount servers similarly donate towards the confirmation or unsatisfactory now the intellect that only server authenticates the client through the assistance of additional server. These paper offerings a symmetric explanation aimed at binary servers PAKE, anywhere the client is able to begin dissimilar cryptographic solutions through the binary servers, correspondingly. Our procedure innings in equivalent and remains more efficient than existing symmetric dual server PAKE procedure, and uniform more effectual than existing unequal dual server PAKE procedure snow positions of similar calculation. Index Terms-Password-authenticated key exchange, dictionary attack, Diffie-Hellman key exchange, ElGamal encryptio
    corecore