SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 11, 661 - 663, 2014 
Protecting Global Records Sharing with Identity Based 
Access Control List 
Vidhya . P 
Computer Science and Engineering 
V.S.B Engineering College 
Tamilnadu, India 
A.P.V Raghavendra 
Computer Science and Engineering 
V.S.B Engineering College 
Tamilnadu, India 
Abstract: Generally, the information is stored in the database. Protecting sensitive information are encrypted before outsourcing to a 
service provider. We send the request to service provider through SQL queries. The query expressiveness is limited by means of any 
software-based cryptographical constructs then deployed, for server-side query working on the encrypted data.Data sharing in the 
service provider is emerging as a promising technique for allowing users to access data. The growing number of customers who stores 
their data in service provider is increasingly challenging users’ privacy and the security of data. The TrustedDB an outsourced 
database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging 
server-hosted. Tamper-proof believed hardware in crucial query processing levels, thereby removing any limits on the type of 
supported queries. It focuses on providing a dependable and secure data sharing service that allows users dynamic access to their 
information. TrustedDB is constructed and runs on hardware, and its performance and costs are evaluated here. 
Keywords: Database architectures, security, privacy, special-purpose hardware. 
1. INTRODUCTION 
Although the benefits of outsourcing and clouds are 
well known, imperative challenges yet lie in the path of large-scale 
adoption since such services often require their 
customers to inherently trust the provider with full access to 
the outsourced data sets. Numerous instances of illicit insider 
behavior or data leaks have left clients backward to place 
known data under the control of a private, unknown provider, 
without practical assurances of privacy and confidentiality, 
especially in occupation, healthcare, and public sectors. 
Moreover, today’s privacy assurance for such services are at 
best informative and subject customers to unreasonable fine-print 
clauses. For example, allowing the server operator to use 
customer behavior and content for commercial profiling or 
governmental control purposes. 
Existing analysis addresses several such safety 
aspects, including entry’s privacy and finds on enciphered 
data. In most of these efforts, data are encrypted before 
outsourcing. Once enciphered however, essential limitations 
in the types of basic operations that can be performed on 
encrypted data lead to fundamental expressiveness and 
practicality constraints. However, recent insights into the cost 
performance tradeoff seem to suggest that things stand 
somewhat differently. Specifically, at scale, in outsourced 
contexts,computation inside secure processors is orders of 
degree lower than any equivalent cryptographic operations 
performed on the provider’s unsecured server hardware, 
despite the overall higher achievement cost of secure 
hardware. 
We conclude that a complete privacy enabling 
secure database leveraging server-side trusted hardware can 
be built and run at a fraction of the cost of any (existing or 
future) cryptography-enabled private data working on 
common server hardware. We verify this by signing and 
building TrustedDB, an a SQL database processing engine 
that makes use of tamper-proof cryptographic coprocessors 
such as the IBM 4764 [1] in close adjacency to the outsourced 
data. 
Change opposes designs, however, is imperatively 
constrained in both computational ability and memory 
capacity which makes implementing fully featured database 
solutions using secure coprocessors (SCPUs) very demand. 
Trusted complete this by applying common unsecured server 
resources to the maximum available duration. For example, 
Trusted permits the SCPU to clearly access external storage 
while protecting data confidentiality in the family of 
encryption. This removes the limitations on the size of 
databases that can be supported. Moreover, client queries are 
preprocessed to identify knowing components to be run inside 
the SCPU. Non knowing operations are offloaded to the 
interested server owner. This highly increases work and 
decrease the cost of the agreement. 
Overall, despite the overheads and performance 
limitations of trusted hardware, the costs of running 
TrustedDB are orders of degree lower than any (existing or) 
potential future cryptography-only mechanisms. Moreover, it 
does not limit query expressiveness. This paper’s 
improvement is triples:1)The opening of current cost setups 
and judgments that explain and specify the advantages of 
utilizing trusted hardware for data working, 2) the design and 
advancement of TrustedDB, a reliable hardware based 
relational database with full data confidentiality and no 
limitations on query expressiveness, and 3) defined query 
optimization approach in a trusted hardware-based query 
execution model. 
2. RELATED WORK 
Queries on encrypted data. To propose a division 
of data into secret partitions and rewriting of range queries 
over the original data in terms of the resulting separation 
qualifiers. This balances a judge between client and server-side 
working, as a function of the data subdivision size. Some 
authors explore optimal bucket sizes for range queries. 
www.ijcat.com 661
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 11, 661 - 663, 2014 
Vertical partitioning of relations amongst multiple 
untrusted servers is employed in [2]. Here, the privacy goal is 
to a prevent access of a subset of attributes by any single 
server. For example, {Name, Address} can be a privacy 
sensitive access-pair and query processing needs to ensure 
that they are not jointly visible to any single server. The client 
query is split into multiple queries wherein each subquery 
fetches the relevant data from a server and the client combines 
results from multiple servers. TrustedDB is equivalent to 
when the size of the privacy subset is one and hence a single 
server answers. In this case, each attributes column demand 
encryption to ensure privacy. Hence, TrustedDB to optimize 
for querying encrypted columns since otherwise they rely on 
client-side decryption and processing. 
To introduce the concept of logical fragments to 
achieve the same partitioning effect on a single server. A 
fragment here is simply a relation wherein attributes not 
desired to be visible in that fragment are encrypted. 
TrustedDB (and other solutions) are in effect concrete 
mechanisms to efficiently query any individual fragment from 
[10]. The work on the other hand, can be used to determine 
the set of attributes that should be encrypted in TrustedDB. 
The goal is to minimize the lifetime of sensitive 
data and keys in server memory after decryption. In 
TrustedDB, there is no such disclosure risk since decryptions 
are performed only within the SCPU. In TrustedDB, all 
decryptions are performed within the secure confinements of 
the SCPU, thereby processing is done on the plaintext data. 
This removes any limitation on the nature of predicates that 
can now be employed on encrypted attributes including 
arbitrary user decided functions. We note that certain 
solutions destined for a very specific set of predicates can be 
more efficient albeit at the loss of functionality. 
Trusted hardware. In [4], SCPUs are used to 
retrieve X509 certificates from a database. However, this only 
supports key based lookup. Each record has a single key and a 
user can query for a record by specifying the key. Multiple 
SCPUs are used to provide key based search. The entire 
database is scanned by the SCPUs to return matching records. 
Chip-Secured Data Access [5] uses a smart card for query 
processing and for enforcing access rights. The client query is 
split such that the server performs the majority of the 
computation. The solution is limited by the fact that the client 
query executing within the smart card cannot generate any 
intermediate results since there is no storage available on the 
card. In follow-up work, GhostDB [6] proposes to embed a 
database inside a USB key equipped with a CPU. It allows 
linking of private data carried in the USB Key and public data 
available on a server. Ghost DB ensures that the only 
information revealed to a potential spy is the query issued and 
the public data accessed. 
Both [5] and [6] are subject to the storage 
limitations of trusted hardware which in turn limits the size of 
the database and the queries that can processed. In contrast, 
TrustedDB uses external storage to store the entire database 
and reads information into the trusted hardware as needed 
which enables it to be used with large databases. Moreover, 
database pages can be swapped out of the trusted hardware to 
external storage during query processing. 
3. MODULES DESCRIPTION 
A. Query Parsing and Execution 
In the first stage a client defines a database schema 
and partially occupy it. Knowing attributes are noted using the 
SENSITIVE keyword which the client layer transparent 
processes by encrypting the corresponding attributes: 
CREATE TABLE customer (ID integer 
primary key, 
Name char (72) SENSITIVE, Address 
char (120) SENSITIVE). 
(1) Later, a client sends a query request to the host server 
through a standard SQL interface. The query is clearly 
enciphered at the client site using the public key of the SCPU. 
The server owner thus cannot decipher the query. 
(2) The server owner serves the enciphered query to the 
Request Handler inside the SCPU. 
(3) The Request Handler deciphers the query and serves it to 
the Query Parser. The query is parsed achieving a set of ideas. 
Each idea is worked by editing the original client query into a 
set of sub-queries, and, presenting to their end data set 
allocation, each sub-query in the idea is qualified as being 
either public or private. 
(4)The Query Optimizer then evaluates the execution costs of 
each of ideas and selects the best idea (one with least cost) for 
execution serving it to the dispatcher. 
(5) The Query Dispatcher serves the public queries to the 
server owner and the private queries to the SCPU database 
engine while handling responsibilities. The net result is that 
the maximum possible work is run on the server owner 
reduced cycles. 
(6) The final query result is assembled, enciphered, digitally 
signed by the SCPU Query Dispatcher, and dispatched to the 
client. 
B. Query optimization process 
At a high level query optimization in a database 
system works as follows. (i) The Query Plan Achiever works 
possibly multiple ideas for the client query. (ii) For each 
worked idea the Query Cost Evaluator computes an evaluate 
of the execution cost of that idea. (iii) The best idea i.e., one 
with the lowest cost, is then selected and passed on to the 
Query Idea Interpretor for execution. The query development 
process in TrustedDB works similarly with key differences in 
the Query Cost Evaluator due to the logical separating of data 
mentioned above. 
C. System Catalog 
Any query idea is composed of multiple individual 
execution steps. To evaluate the cost of the entire idea it is 
essential to evaluate the cost of individual steps and combine 
them. In order to evaluate these costs the Query Cost 
Evaluator needs access to some key information. E.g., the 
possibility of an index or the knowledge of possible distinct 
values of an attribute. These sets of instruction are collected 
and stored in the System Catalog. Most available databases 
today have some form of the continuously updated System 
Catalog. 
D. Analysis of Basic Query Operations 
www.ijcat.com 662
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 11, 661 - 663, 2014 
The cost of an idea is the separate of the cost of the 
steps that comprise it. In this section we present how 
execution times for a certain set of basic query idea steps are 
evaluated. 
4. SYSTEM FLOW DIAGRAM 
Fig: 1 System Flow Diagram 
A client sends a query request to the host server 
through a standard SQL interface. The query is clearly 
enciphered at the client site using the public key of the SCPU. 
The server owner thus cannot decipher the query. The server 
owner serves the enciphered query to the Request Handler 
inside the SCPU. The Request Handler deciphers the query 
and serves it to the Query Parser. The query is parsed 
achieving a set of ideas. Each idea is worked by editing the 
original client query into a set of sub-queries, and, presenting 
to their end data set allocation, each sub-query in the idea is 
qualified as being either public or private. The Query 
Optimizer then evaluates the execution costs of each of ideas 
and selects the best idea (one with least cost) for execution 
serving it to the dispatcher. The Query Dispatcher serves the 
public queries to the server owner and the private queries to 
the SCPU database engine while handling responsibilities. 
The net result is that the maximum possible work is run on the 
server owner reduced cycles. The final query result is 
assembled, enciphered, digitally signed by the SCPU Query 
Dispatcher, and dispatched to the client. 
4. CONCLUSION 
This paper’s improvement are triples: 
1)The opening of current cost setups and judgments that 
explain and specify the advantages of utilizing trusted 
hardware for data working, 2) the design and advancement of 
TrustedDB, a reliable hardware based relational database with 
full data confidentiality and no limitations on query 
expressiveness, and 3) defined query optimization approach in 
a trusted hardware-based query execution model. 
This work’s inherent proposal is that, at order, in 
expand contexts, computation inside secure hardware 
processors is orders of degree lower than equivalent 
cryptography performed on suppliers’ unsecured server 
hardware, even though the overall higher achievement cost of 
protected hardware. We thus propose to make reliable 
hardware a first-class member in the secure data management 
field. Moreover, we promise that cost-centric insights and 
architectural standards will fundamentally change the way 
systems and algorithms are signed. 
5. REFERENCES 
[1] IBM 4764 PCI-X Cryptographic Coprocessor, 
http://www03.ibm.com/security/cryptocards/pcixcc/overview. 
shtml, 2007. 
[2] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, 
and R.Motwani, “Distributing Data for Secure Database 
Services,” Proc.Fourth Int’l Workshop Privacy and 
Anonymity in the Information Soc.(PAIS ’11), pp. 8:1-8:10, 
2011. 
[3] V. Ciriani, S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. 
Paraboschi,and P. Samarati, “Combining Fragmentation and 
Encryption to Protect Privacy in Data Storage,” ACM Trans. 
Information and System Security, vol. 13, no. 3, pp. 22:1- 
22:33, July 2010. 
[4] A. Iliev and S.W. Smith, “Protecting Client Privacy with 
Trusted Computing at the Server,” IEEE Security and Privacy, 
vol. 3, no. 2, pp. 20-28, Mar./Apr. 2005. 
[5] L. Bouganim and P. Pucheral, “Chip-Secured Data 
Access:Confidential Data on Untrusted Server,” Proc. 28th 
Int’l Conf.Very Large Data Bases (VLDB ’02), pp. 131-141, 
2002. 
[6] N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and 
D. Shasha,“GhostDB: Querying Visible and Hidden Data 
Without Leaks,”Proc. 26th Int’l ACM Conf. Managem ent of 
Data (SIGMOD), 2007. 
www.ijcat.com 663

Más contenido relacionado

La actualidad más candente

Improving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing inImproving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing inIAEME Publication
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...swathi78
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverProvable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverIJERA Editor
 
A Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseA Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseIJTET Journal
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET Journal
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
Architecture authorization-constrained
Architecture authorization-constrainedArchitecture authorization-constrained
Architecture authorization-constrainedAhmed Sabeeh
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession forIMPULSE_TECHNOLOGY
 

La actualidad más candente (18)

Improving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing inImproving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing in
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverProvable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted server
 
A Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseA Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud Database
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Architecture authorization-constrained
Architecture authorization-constrainedArchitecture authorization-constrained
Architecture authorization-constrained
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 

Destacado

Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterEditor IJCATR
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Editor IJCATR
 
Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...
Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...
Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...Editor IJCATR
 
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...Editor IJCATR
 
Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...
Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...
Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...Editor IJCATR
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
 
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain ModelOrder Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain ModelEditor IJCATR
 
Reducing Manufacturing Cost through Value Stream Mapping
Reducing Manufacturing Cost through Value Stream MappingReducing Manufacturing Cost through Value Stream Mapping
Reducing Manufacturing Cost through Value Stream MappingEditor IJCATR
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Pattern Recognition using Artificial Neural Network
Pattern Recognition using Artificial Neural NetworkPattern Recognition using Artificial Neural Network
Pattern Recognition using Artificial Neural NetworkEditor IJCATR
 
Energy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEnergy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
 
Short Notes for Understanding the Basics of Nano Technology
Short Notes for Understanding the Basics of Nano TechnologyShort Notes for Understanding the Basics of Nano Technology
Short Notes for Understanding the Basics of Nano TechnologyEditor IJCATR
 
An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...
An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...
An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...Editor IJCATR
 

Destacado (15)

Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
 
Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...
Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...
Mathematical Approach to Complexity-Reduced Antenna Selection Technique for A...
 
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...
 
Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...
Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...
Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain ModelOrder Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model
 
Reducing Manufacturing Cost through Value Stream Mapping
Reducing Manufacturing Cost through Value Stream MappingReducing Manufacturing Cost through Value Stream Mapping
Reducing Manufacturing Cost through Value Stream Mapping
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Pattern Recognition using Artificial Neural Network
Pattern Recognition using Artificial Neural NetworkPattern Recognition using Artificial Neural Network
Pattern Recognition using Artificial Neural Network
 
Energy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEnergy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using Kerberos
 
Short Notes for Understanding the Basics of Nano Technology
Short Notes for Understanding the Basics of Nano TechnologyShort Notes for Understanding the Basics of Nano Technology
Short Notes for Understanding the Basics of Nano Technology
 
An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...
An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...
An Evaluation of Feature Selection Methods for Positive- Unlabeled Learning i...
 

Similar a Protecting Global Records Sharing with Identity Based Access Control List

Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...JPINFOTECH JAYAPRAKASH
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentialitytheijes
 
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...Papitha Velumani
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...chennaijp
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...IEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEEMEMTECHSTUDENTPROJECTS
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...LeMeniz Infotech
 

Similar a Protecting Global Records Sharing with Identity Based Access Control List (20)

Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentiality
 
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 

Más de Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

Más de Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Último

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Protecting Global Records Sharing with Identity Based Access Control List

  • 1. International Journal of Computer Applications Technology and Research Volume 3– Issue 11, 661 - 663, 2014 Protecting Global Records Sharing with Identity Based Access Control List Vidhya . P Computer Science and Engineering V.S.B Engineering College Tamilnadu, India A.P.V Raghavendra Computer Science and Engineering V.S.B Engineering College Tamilnadu, India Abstract: Generally, the information is stored in the database. Protecting sensitive information are encrypted before outsourcing to a service provider. We send the request to service provider through SQL queries. The query expressiveness is limited by means of any software-based cryptographical constructs then deployed, for server-side query working on the encrypted data.Data sharing in the service provider is emerging as a promising technique for allowing users to access data. The growing number of customers who stores their data in service provider is increasingly challenging users’ privacy and the security of data. The TrustedDB an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging server-hosted. Tamper-proof believed hardware in crucial query processing levels, thereby removing any limits on the type of supported queries. It focuses on providing a dependable and secure data sharing service that allows users dynamic access to their information. TrustedDB is constructed and runs on hardware, and its performance and costs are evaluated here. Keywords: Database architectures, security, privacy, special-purpose hardware. 1. INTRODUCTION Although the benefits of outsourcing and clouds are well known, imperative challenges yet lie in the path of large-scale adoption since such services often require their customers to inherently trust the provider with full access to the outsourced data sets. Numerous instances of illicit insider behavior or data leaks have left clients backward to place known data under the control of a private, unknown provider, without practical assurances of privacy and confidentiality, especially in occupation, healthcare, and public sectors. Moreover, today’s privacy assurance for such services are at best informative and subject customers to unreasonable fine-print clauses. For example, allowing the server operator to use customer behavior and content for commercial profiling or governmental control purposes. Existing analysis addresses several such safety aspects, including entry’s privacy and finds on enciphered data. In most of these efforts, data are encrypted before outsourcing. Once enciphered however, essential limitations in the types of basic operations that can be performed on encrypted data lead to fundamental expressiveness and practicality constraints. However, recent insights into the cost performance tradeoff seem to suggest that things stand somewhat differently. Specifically, at scale, in outsourced contexts,computation inside secure processors is orders of degree lower than any equivalent cryptographic operations performed on the provider’s unsecured server hardware, despite the overall higher achievement cost of secure hardware. We conclude that a complete privacy enabling secure database leveraging server-side trusted hardware can be built and run at a fraction of the cost of any (existing or future) cryptography-enabled private data working on common server hardware. We verify this by signing and building TrustedDB, an a SQL database processing engine that makes use of tamper-proof cryptographic coprocessors such as the IBM 4764 [1] in close adjacency to the outsourced data. Change opposes designs, however, is imperatively constrained in both computational ability and memory capacity which makes implementing fully featured database solutions using secure coprocessors (SCPUs) very demand. Trusted complete this by applying common unsecured server resources to the maximum available duration. For example, Trusted permits the SCPU to clearly access external storage while protecting data confidentiality in the family of encryption. This removes the limitations on the size of databases that can be supported. Moreover, client queries are preprocessed to identify knowing components to be run inside the SCPU. Non knowing operations are offloaded to the interested server owner. This highly increases work and decrease the cost of the agreement. Overall, despite the overheads and performance limitations of trusted hardware, the costs of running TrustedDB are orders of degree lower than any (existing or) potential future cryptography-only mechanisms. Moreover, it does not limit query expressiveness. This paper’s improvement is triples:1)The opening of current cost setups and judgments that explain and specify the advantages of utilizing trusted hardware for data working, 2) the design and advancement of TrustedDB, a reliable hardware based relational database with full data confidentiality and no limitations on query expressiveness, and 3) defined query optimization approach in a trusted hardware-based query execution model. 2. RELATED WORK Queries on encrypted data. To propose a division of data into secret partitions and rewriting of range queries over the original data in terms of the resulting separation qualifiers. This balances a judge between client and server-side working, as a function of the data subdivision size. Some authors explore optimal bucket sizes for range queries. www.ijcat.com 661
  • 2. International Journal of Computer Applications Technology and Research Volume 3– Issue 11, 661 - 663, 2014 Vertical partitioning of relations amongst multiple untrusted servers is employed in [2]. Here, the privacy goal is to a prevent access of a subset of attributes by any single server. For example, {Name, Address} can be a privacy sensitive access-pair and query processing needs to ensure that they are not jointly visible to any single server. The client query is split into multiple queries wherein each subquery fetches the relevant data from a server and the client combines results from multiple servers. TrustedDB is equivalent to when the size of the privacy subset is one and hence a single server answers. In this case, each attributes column demand encryption to ensure privacy. Hence, TrustedDB to optimize for querying encrypted columns since otherwise they rely on client-side decryption and processing. To introduce the concept of logical fragments to achieve the same partitioning effect on a single server. A fragment here is simply a relation wherein attributes not desired to be visible in that fragment are encrypted. TrustedDB (and other solutions) are in effect concrete mechanisms to efficiently query any individual fragment from [10]. The work on the other hand, can be used to determine the set of attributes that should be encrypted in TrustedDB. The goal is to minimize the lifetime of sensitive data and keys in server memory after decryption. In TrustedDB, there is no such disclosure risk since decryptions are performed only within the SCPU. In TrustedDB, all decryptions are performed within the secure confinements of the SCPU, thereby processing is done on the plaintext data. This removes any limitation on the nature of predicates that can now be employed on encrypted attributes including arbitrary user decided functions. We note that certain solutions destined for a very specific set of predicates can be more efficient albeit at the loss of functionality. Trusted hardware. In [4], SCPUs are used to retrieve X509 certificates from a database. However, this only supports key based lookup. Each record has a single key and a user can query for a record by specifying the key. Multiple SCPUs are used to provide key based search. The entire database is scanned by the SCPUs to return matching records. Chip-Secured Data Access [5] uses a smart card for query processing and for enforcing access rights. The client query is split such that the server performs the majority of the computation. The solution is limited by the fact that the client query executing within the smart card cannot generate any intermediate results since there is no storage available on the card. In follow-up work, GhostDB [6] proposes to embed a database inside a USB key equipped with a CPU. It allows linking of private data carried in the USB Key and public data available on a server. Ghost DB ensures that the only information revealed to a potential spy is the query issued and the public data accessed. Both [5] and [6] are subject to the storage limitations of trusted hardware which in turn limits the size of the database and the queries that can processed. In contrast, TrustedDB uses external storage to store the entire database and reads information into the trusted hardware as needed which enables it to be used with large databases. Moreover, database pages can be swapped out of the trusted hardware to external storage during query processing. 3. MODULES DESCRIPTION A. Query Parsing and Execution In the first stage a client defines a database schema and partially occupy it. Knowing attributes are noted using the SENSITIVE keyword which the client layer transparent processes by encrypting the corresponding attributes: CREATE TABLE customer (ID integer primary key, Name char (72) SENSITIVE, Address char (120) SENSITIVE). (1) Later, a client sends a query request to the host server through a standard SQL interface. The query is clearly enciphered at the client site using the public key of the SCPU. The server owner thus cannot decipher the query. (2) The server owner serves the enciphered query to the Request Handler inside the SCPU. (3) The Request Handler deciphers the query and serves it to the Query Parser. The query is parsed achieving a set of ideas. Each idea is worked by editing the original client query into a set of sub-queries, and, presenting to their end data set allocation, each sub-query in the idea is qualified as being either public or private. (4)The Query Optimizer then evaluates the execution costs of each of ideas and selects the best idea (one with least cost) for execution serving it to the dispatcher. (5) The Query Dispatcher serves the public queries to the server owner and the private queries to the SCPU database engine while handling responsibilities. The net result is that the maximum possible work is run on the server owner reduced cycles. (6) The final query result is assembled, enciphered, digitally signed by the SCPU Query Dispatcher, and dispatched to the client. B. Query optimization process At a high level query optimization in a database system works as follows. (i) The Query Plan Achiever works possibly multiple ideas for the client query. (ii) For each worked idea the Query Cost Evaluator computes an evaluate of the execution cost of that idea. (iii) The best idea i.e., one with the lowest cost, is then selected and passed on to the Query Idea Interpretor for execution. The query development process in TrustedDB works similarly with key differences in the Query Cost Evaluator due to the logical separating of data mentioned above. C. System Catalog Any query idea is composed of multiple individual execution steps. To evaluate the cost of the entire idea it is essential to evaluate the cost of individual steps and combine them. In order to evaluate these costs the Query Cost Evaluator needs access to some key information. E.g., the possibility of an index or the knowledge of possible distinct values of an attribute. These sets of instruction are collected and stored in the System Catalog. Most available databases today have some form of the continuously updated System Catalog. D. Analysis of Basic Query Operations www.ijcat.com 662
  • 3. International Journal of Computer Applications Technology and Research Volume 3– Issue 11, 661 - 663, 2014 The cost of an idea is the separate of the cost of the steps that comprise it. In this section we present how execution times for a certain set of basic query idea steps are evaluated. 4. SYSTEM FLOW DIAGRAM Fig: 1 System Flow Diagram A client sends a query request to the host server through a standard SQL interface. The query is clearly enciphered at the client site using the public key of the SCPU. The server owner thus cannot decipher the query. The server owner serves the enciphered query to the Request Handler inside the SCPU. The Request Handler deciphers the query and serves it to the Query Parser. The query is parsed achieving a set of ideas. Each idea is worked by editing the original client query into a set of sub-queries, and, presenting to their end data set allocation, each sub-query in the idea is qualified as being either public or private. The Query Optimizer then evaluates the execution costs of each of ideas and selects the best idea (one with least cost) for execution serving it to the dispatcher. The Query Dispatcher serves the public queries to the server owner and the private queries to the SCPU database engine while handling responsibilities. The net result is that the maximum possible work is run on the server owner reduced cycles. The final query result is assembled, enciphered, digitally signed by the SCPU Query Dispatcher, and dispatched to the client. 4. CONCLUSION This paper’s improvement are triples: 1)The opening of current cost setups and judgments that explain and specify the advantages of utilizing trusted hardware for data working, 2) the design and advancement of TrustedDB, a reliable hardware based relational database with full data confidentiality and no limitations on query expressiveness, and 3) defined query optimization approach in a trusted hardware-based query execution model. This work’s inherent proposal is that, at order, in expand contexts, computation inside secure hardware processors is orders of degree lower than equivalent cryptography performed on suppliers’ unsecured server hardware, even though the overall higher achievement cost of protected hardware. We thus propose to make reliable hardware a first-class member in the secure data management field. Moreover, we promise that cost-centric insights and architectural standards will fundamentally change the way systems and algorithms are signed. 5. REFERENCES [1] IBM 4764 PCI-X Cryptographic Coprocessor, http://www03.ibm.com/security/cryptocards/pcixcc/overview. shtml, 2007. [2] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R.Motwani, “Distributing Data for Secure Database Services,” Proc.Fourth Int’l Workshop Privacy and Anonymity in the Information Soc.(PAIS ’11), pp. 8:1-8:10, 2011. [3] V. Ciriani, S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi,and P. Samarati, “Combining Fragmentation and Encryption to Protect Privacy in Data Storage,” ACM Trans. Information and System Security, vol. 13, no. 3, pp. 22:1- 22:33, July 2010. [4] A. Iliev and S.W. Smith, “Protecting Client Privacy with Trusted Computing at the Server,” IEEE Security and Privacy, vol. 3, no. 2, pp. 20-28, Mar./Apr. 2005. [5] L. Bouganim and P. Pucheral, “Chip-Secured Data Access:Confidential Data on Untrusted Server,” Proc. 28th Int’l Conf.Very Large Data Bases (VLDB ’02), pp. 131-141, 2002. [6] N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha,“GhostDB: Querying Visible and Hidden Data Without Leaks,”Proc. 26th Int’l ACM Conf. Managem ent of Data (SIGMOD), 2007. www.ijcat.com 663