a hardware based db prototype with privacy under regulatory compliance and constraints

D. Divya,R.Devika

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 27 May,2015         Pages:412-417

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Information sharing is that the key goal of Cloud Storage servers. It permits storage of sensitive and huge volume of information with restricted price and high access edges. Security should be in given due importance for the cloud information with utmost care to the info and confidence to the info owner. however this limits the employment of information through plain text search. thence a superb methodology is needed to match the keywords with encrypted cloud information. The projected approach similarity live of “coordinate matching” combined with “inner product similarity” quantitatively evaluates and matches all relevant information with search keyword to make best results.In this approach, every document is related to a binary vector to represent a keyword contained within the document. The search keyword is additionally delineated as a binary vector, therefore the similarity may be precisely measured by the dot product of the question vector with the info vector. The dot product computation and also the 2 multi-keyword hierarchic search over encrypted information (MRSE) schemes ensures information privacy and provides elaborate data concerning the dynamic operation on the info set and index and thence improves the search expertise of the user. projected system utilize the thought of Similarity confirmation Validation Technique within the individual pages when serial equal proportion page partition on the documents.

Kewords

List architectures, retreat, Secrecy, Distinct-resolve Hardware.

Reference

[1].FIPS PUB 140-2, Security Requirements for Cryptographic Modules. Online at http://csrc.nist.gov/groups/STM/cmvp/ standards.html#02.IEEE Transactions on Knowledge and Data Engineering,Volume:26,Issue:3,Issue Date :March 2014 [2].TPC-H Benchmark. Online at http://www.tpc.org/tpch/. [3].IBM 4764 PCI-X Cryptographic Coprocessor. Online at http:// www-03.ibm.com/security/cryptocards/pcixcc/overview.shtml, 2007. [4].Gagan Aggarwal, MayankBawa, Prasanna Ganesan, Hector Garcia-Molina, KrishnaramKenthapadi, Rajeev Motwani,Utkarsh Srivastava, Dilys Thomas, and Ying Xu 0002. Two can keep a secret: A distributed architecture for secure database services. In CIDR, pages 186–199, 2005. [5] .Alexander Iliev and Sean WSmith. Protecting Client Privacy with Trusted Computing at the Server. IEEE, Security and Privacy, 3(2),Apr 2005. [6]. MihirBellare. New proofs for nmac and hmac: Security without collision-resistance. pages 602–619. Springer-Verlag, 2006. [7].BishwaranjanBhattacharjee, Naoki Abe, Kenneth Goldman, Bianca Zadrozny, ChidApte, Vamsavardhana R. Chillakuru and Marysabel del Carpio. Using secure coprocessors for privacy preserving collaborative data mining and analysis. In Proceedingsof DaMoN, 2006. [8] .Mustafa Canim, Murat Kantarcioglu, BijitHore, and SharadMehrotra. Building disclosure risk aware query optimizers for relational databases. Proc. VLDB Endow., 3(1-2):13–24, September 2010. [9] .Yao Chen and RaduSion. To cloud or not to cloud?: musings on costs and viability. In Proceedings of SOCC, pages 29:1–29:7. ACM, 2011. [10]. Valentina Ciriani, Sabrina De Capitani Di Vimercati, Sara Foresti, SushilJajodia, Stefano Paraboschi, and PierangelaSamarati. Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur., 13(3):22:1–22:33, July 2010.