Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

VOTE: Verifiable Auditing for Outsourced Database with Token Enforced Cloud Storage

View through CrossRef
Database deploying is one of the remarkable utilities in cloud computing where the Information Proprietor (IP) assigns the database administration to the Cloud Service Provider (CSP) in order to lower the administration overhead and preservation expenditures of the database. Regardless of its overwhelming advantages, it experiences few security problems such as confidentiality of deployed database and auditability of search outcome. In recent past, survey has been carried out on the auditability of search outcome of deployed database that gives preciseness and intactness of search outcome. But in the prevailing schemes, since there is flow of data between IP and the clients repeatedly, huge communication cost is incurred at the Information Proprietor side. To address this challenge, we introduce Verifiable Auditing of Outsourced Database with Token Enforced Cloud Storage (VOTE) mechanism based on Merkle Hash Tree (MHT), Invertible Bloom Filter(IBF) and Counting Bloom Filter(CBF). The proposed scheme reduces the huge communication cost at the Information Proprietor side and achieves preciseness and intactness of the search outcome. Experimental analysis show that the proposed scheme has totally reduced the huge communication cost at the Information Proprietor side, and simultaneously achieves the preciseness and intactness of search outcome though the semi- trusted CSP deliberately sends a null set.
Title: VOTE: Verifiable Auditing for Outsourced Database with Token Enforced Cloud Storage
Description:
Database deploying is one of the remarkable utilities in cloud computing where the Information Proprietor (IP) assigns the database administration to the Cloud Service Provider (CSP) in order to lower the administration overhead and preservation expenditures of the database.
Regardless of its overwhelming advantages, it experiences few security problems such as confidentiality of deployed database and auditability of search outcome.
In recent past, survey has been carried out on the auditability of search outcome of deployed database that gives preciseness and intactness of search outcome.
But in the prevailing schemes, since there is flow of data between IP and the clients repeatedly, huge communication cost is incurred at the Information Proprietor side.
To address this challenge, we introduce Verifiable Auditing of Outsourced Database with Token Enforced Cloud Storage (VOTE) mechanism based on Merkle Hash Tree (MHT), Invertible Bloom Filter(IBF) and Counting Bloom Filter(CBF).
The proposed scheme reduces the huge communication cost at the Information Proprietor side and achieves preciseness and intactness of the search outcome.
Experimental analysis show that the proposed scheme has totally reduced the huge communication cost at the Information Proprietor side, and simultaneously achieves the preciseness and intactness of search outcome though the semi- trusted CSP deliberately sends a null set.

Related Results

VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary dupli...
DATABASE MANAGEMENT SYSTEMS
DATABASE MANAGEMENT SYSTEMS
This comprehensive textbook on Database Management Systems (DBMS) covers the fundamental concepts and principles of database design and management. It is a must-read for students a...
Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq
Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, any...
A global volcanic eruption source parameter database with application to determination of ashfall risk to infrastructure
A global volcanic eruption source parameter database with application to determination of ashfall risk to infrastructure
<p>Volcanic eruption sequences are often very long in length, and can cause significant downtimes and damage to infrastructure. Over the course of the H2020 EURATOM N...
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
As the number of context-aware and unique data extracting and computing has grown leaps and bounds, paving way to their application in many platforms, Internet of Things (IoT) has ...
Sex and gender differences in drug treatment: experiences from the knowledge database Janusmed Sex and Gender
Sex and gender differences in drug treatment: experiences from the knowledge database Janusmed Sex and Gender
Abstract Background Evidence from clinical research indicates that men and women can differ in response to drug treatment. The knowledge database Ja...
Resource Allocation in Cloud Computing Environment using AHP Technique
Resource Allocation in Cloud Computing Environment using AHP Technique
Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and...
Systemic Racism in Police Killings: New Evidence From the Mapping Police Violence Database, 2013–2021
Systemic Racism in Police Killings: New Evidence From the Mapping Police Violence Database, 2013–2021
This research note provides new evidence consistent with systemic anti-Black racism in police killings across the United States. Data come from the Mapping Police Violence Database...

Back to Top