IJCATR Volume 3 Issue 11

Protecting Global Records Sharing with Identity Based Access Control List

Vidhya. P A. P. V Raghavendra
10.7753/IJCATR0311.1001
keywords : Database architectures, security, privacy, special-purpose hardware.

PDF
Generally, the information is stored in the database. Protecting sensitive information are encrypted before outsourcing to a service provider. We send the request to service provider through SQL queries. The query expressiveness is limited by means of any software-based cryptographical constructs then deployed, for server-side query working on the encrypted data.Data sharing in the service provider is emerging as a promising technique for allowing users to access data. The growing number of customers who stores their data in service provider is increasingly challenging users’ privacy and the security of data. The TrustedDB an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging server-hosted. Tamper-proof believed hardware in crucial query processing levels, thereby removing any limits on the type of supported queries. It focuses on providing a dependable and secure data sharing service that allows users dynamic access to their information. TrustedDB is constructed and runs on hardware, and its performance and costs are evaluated here.
@artical{v3112014ijcatr03111001,
Title = "Protecting Global Records Sharing with Identity Based Access Control List",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "3",
Issue ="11",
Pages ="661 - 663",
Year = "2014",
Authors ="Vidhya. P A. P. V Raghavendra"}
  • null