SlideShare a Scribd company logo
1 of 16
A Comprehensive Study of Privacy Preserving
Techniques in Cloud Computing Environment
BANGALORE INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
DATABASE MANAGEMENT SYSTEM-18CS53
Faculty Incharge:
Mrs. Chethana M
Assistant Professor.
Dept. Of Information Science and Engineering
Submitted by:
Sagar Ghosh 1BI20IS073
Sahil Paryani 1BI20IS075
Sathvik K 1BI20IS084
Siddartha V T 1BI20IS108
INTRODUCTION
 Data Privacy has become one of the biggest concerns for both individuals and organizations.
 The huge growth in cloud storage utilization over the past year has made a big demand for an
advanced technique and strong tools.
 This adds more pressure on cloud service providers to gain more trust.
 This paper surveys various privacy-preserving techniques in cloud computing.
 Now we are going to demonstrate on the most innovative and strongest techniques that
researchers has figured out and tested so far.
In Cloud Computing:
 Cloud Computing as defined by NIST “ a model for enabling convenient, on demand network
access to a shared pool of configurable computing resources.
 Eg: Networks, Servers, Storage, Applications.
 Over the years, cloud services have expanded more to catch the interests and demands of the users
with less cost features of its services.
 Users of Cloud like : Normal Individuals , Big Expanding Companies, Governments are all
interested in the modern magic of safeguarding knowledge and information.
Cloud Computing:
LITERATURE SURVEY
 Bayan O Al-Amri, Mohammed A. AlZain, Jehad Al-Amri, Mohammed Baz, Mehedi Masud
College of Computers and Information Technology, Taif University, Saudi Arabia
 Article Info:
Received: 06 December,2019
Accepted: 04 March,2020
 This article focuses on :
1.Cloud Computing
2.Multi Clouds
3.Cloud Storage
4. Privacy Preserving
5. Deep Learning
 In cloud environment, data must be kept secure and safe.
 In today’s world there exist a lot of third-party cloud computing service and support providers of
data, administration for processes, and much more of various needed services in the field.
 Their services yet are not just profitable, but offers even more vulnerabilities to cloud platform.
 Cloud computing systems permit users to execute calculations on a massive quantity of data
without building a whole groundwork from scratch.
 Sending user’s data to the cloud server in the form of plaintext may endanger it to complete
disclosure of data.
Data Breach in Cloud Services:
METHODOLOGY
 One of the mechanism to protect data is hiding data by using specific calculations and algorithms.
Figure 1: Privacy Preserving Techniques.
 We are discussing three current privacy preservation techniques, which are most fascinating.
 1. L-EnCDB Scheme
• L-EnCDB is a novel lightweight encryption mechanism for databases.
• This encryption method is using a format preserving encryption (FPE) scheme proposed with
the L-EnCDB.
• Secret and confidential data are generally encrypted before publishing to clouds for security
necessities.
• This results in a huge demand in practical operational databases.
• Authors proposed this technique by addressing the following results:
 The technique supports practical SQL-based queries.
 Maintaining database structure.
Major Privacy Preserving Techniques:
 The traditional methods of applying security to data used to be by encrypting data with techniques
such as :
public key encryption, and
symmetric key encryption
 Yet they change data types which makes it difficult to use them in database applications for
several operations in SQL such as queries.
 Data extracted through queries cannot be protected if traditional encryption techniques do not
meet the desired measures.
 This gives data owners a mission to both secure data and send them in a changeable form.
 This is why L-EnCDB scheme was suggested. It proposes a trivial encrypted database method
signified by L-EncDB
 This method promises to achieve the necessities discussed beforehand, which are securing data
without changing their format in a database.
 L-EncDB can be successfully executed by using (FPE) technique and character string scheme, this way a
data format can be preserved while in cipher text form.
 FPE enchances security in databases, its mission is to create a cipher text.
 There are two layers in this system:
• The first layer is the application system layer where several encryption methods (FPE,FQE,OPE)
are used in several SQL queries,
• And the interface installed in the database will perform SQL analysis, encrypt, and create cipher texts.
• While the second layer is a database layer which is responsible for permitting developers to only
perform SQL related functions, and also offer data services.
L-EncDB layers:
Security concepts:
 SQL analysis interface is installed at the application layer or user’s side of the system.
 In this system there is expected to be a way to secure the key used in this encryption method.
 Two kind of adversaries that can used with the system’s security:
• Those who target the database, with an attack to encrypted data and a database structure.
• Adversaries who target both the database and system’s applications.
Three SQL operations on cloud:
 L-EncDB is believed to be more practical supporting fuzzy queries in SQL.
 It offers a lighter and easier way to perform operations over data and sharing data securely to
cloud providers.
 It guarantees privacy preserving for queried data from the database, which means securing
valuable data when linking the database to the cloud.
 L-EncDB is suggested as an innovative technique that assures security and privacy preserving
measures for data on cloud databases.
 Making the technique extra efficient it will be going under more examinations.
 In summary, here are some points and remarks regarding every method and some noticeable
highlights, addressed in the following table:
Results:
Conclusion:
 This paper describes the importance of data security and why we need privacy preserving techniques in cloud
computing.
 The paper discusses different surveyed privacy preserving techniques proposed by researchers.
 Summary of the three important techniques are discussed. The cloud computing field is improving and offering
several solutions to serve this goal privacy preserving.
 We believe that this paper will help whom ever has the need to improve further techniques in the privacy
preserving field, to enhance a better yet stronger approaches.
THANK YOU

More Related Content

Similar to dbms ppt .pptx

Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
scientific report journal
scientific report journalscientific report journal
scientific report journalchaitanya451336
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsPrivacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsMd Uddin
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Pvrtechnologies Nellore
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 

Similar to dbms ppt .pptx (20)

Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Final 1st
Final 1stFinal 1st
Final 1st
 
scientific report journal
scientific report journalscientific report journal
scientific report journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsPrivacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public Clouds
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
C017421624
C017421624C017421624
C017421624
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

dbms ppt .pptx

  • 1. A Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment BANGALORE INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING DATABASE MANAGEMENT SYSTEM-18CS53 Faculty Incharge: Mrs. Chethana M Assistant Professor. Dept. Of Information Science and Engineering Submitted by: Sagar Ghosh 1BI20IS073 Sahil Paryani 1BI20IS075 Sathvik K 1BI20IS084 Siddartha V T 1BI20IS108
  • 2. INTRODUCTION  Data Privacy has become one of the biggest concerns for both individuals and organizations.  The huge growth in cloud storage utilization over the past year has made a big demand for an advanced technique and strong tools.  This adds more pressure on cloud service providers to gain more trust.  This paper surveys various privacy-preserving techniques in cloud computing.  Now we are going to demonstrate on the most innovative and strongest techniques that researchers has figured out and tested so far. In Cloud Computing:
  • 3.  Cloud Computing as defined by NIST “ a model for enabling convenient, on demand network access to a shared pool of configurable computing resources.  Eg: Networks, Servers, Storage, Applications.  Over the years, cloud services have expanded more to catch the interests and demands of the users with less cost features of its services.  Users of Cloud like : Normal Individuals , Big Expanding Companies, Governments are all interested in the modern magic of safeguarding knowledge and information. Cloud Computing:
  • 4. LITERATURE SURVEY  Bayan O Al-Amri, Mohammed A. AlZain, Jehad Al-Amri, Mohammed Baz, Mehedi Masud College of Computers and Information Technology, Taif University, Saudi Arabia  Article Info: Received: 06 December,2019 Accepted: 04 March,2020  This article focuses on : 1.Cloud Computing 2.Multi Clouds 3.Cloud Storage 4. Privacy Preserving 5. Deep Learning
  • 5.  In cloud environment, data must be kept secure and safe.  In today’s world there exist a lot of third-party cloud computing service and support providers of data, administration for processes, and much more of various needed services in the field.  Their services yet are not just profitable, but offers even more vulnerabilities to cloud platform.  Cloud computing systems permit users to execute calculations on a massive quantity of data without building a whole groundwork from scratch.  Sending user’s data to the cloud server in the form of plaintext may endanger it to complete disclosure of data. Data Breach in Cloud Services:
  • 6. METHODOLOGY  One of the mechanism to protect data is hiding data by using specific calculations and algorithms. Figure 1: Privacy Preserving Techniques.
  • 7.  We are discussing three current privacy preservation techniques, which are most fascinating.  1. L-EnCDB Scheme • L-EnCDB is a novel lightweight encryption mechanism for databases. • This encryption method is using a format preserving encryption (FPE) scheme proposed with the L-EnCDB. • Secret and confidential data are generally encrypted before publishing to clouds for security necessities. • This results in a huge demand in practical operational databases. • Authors proposed this technique by addressing the following results:  The technique supports practical SQL-based queries.  Maintaining database structure. Major Privacy Preserving Techniques:
  • 8.  The traditional methods of applying security to data used to be by encrypting data with techniques such as : public key encryption, and symmetric key encryption  Yet they change data types which makes it difficult to use them in database applications for several operations in SQL such as queries.  Data extracted through queries cannot be protected if traditional encryption techniques do not meet the desired measures.  This gives data owners a mission to both secure data and send them in a changeable form.  This is why L-EnCDB scheme was suggested. It proposes a trivial encrypted database method signified by L-EncDB  This method promises to achieve the necessities discussed beforehand, which are securing data without changing their format in a database.
  • 9.  L-EncDB can be successfully executed by using (FPE) technique and character string scheme, this way a data format can be preserved while in cipher text form.  FPE enchances security in databases, its mission is to create a cipher text.
  • 10.  There are two layers in this system: • The first layer is the application system layer where several encryption methods (FPE,FQE,OPE) are used in several SQL queries, • And the interface installed in the database will perform SQL analysis, encrypt, and create cipher texts. • While the second layer is a database layer which is responsible for permitting developers to only perform SQL related functions, and also offer data services. L-EncDB layers:
  • 11. Security concepts:  SQL analysis interface is installed at the application layer or user’s side of the system.  In this system there is expected to be a way to secure the key used in this encryption method.  Two kind of adversaries that can used with the system’s security: • Those who target the database, with an attack to encrypted data and a database structure. • Adversaries who target both the database and system’s applications.
  • 12. Three SQL operations on cloud:
  • 13.  L-EncDB is believed to be more practical supporting fuzzy queries in SQL.  It offers a lighter and easier way to perform operations over data and sharing data securely to cloud providers.  It guarantees privacy preserving for queried data from the database, which means securing valuable data when linking the database to the cloud.  L-EncDB is suggested as an innovative technique that assures security and privacy preserving measures for data on cloud databases.  Making the technique extra efficient it will be going under more examinations.
  • 14.  In summary, here are some points and remarks regarding every method and some noticeable highlights, addressed in the following table: Results:
  • 15. Conclusion:  This paper describes the importance of data security and why we need privacy preserving techniques in cloud computing.  The paper discusses different surveyed privacy preserving techniques proposed by researchers.  Summary of the three important techniques are discussed. The cloud computing field is improving and offering several solutions to serve this goal privacy preserving.  We believe that this paper will help whom ever has the need to improve further techniques in the privacy preserving field, to enhance a better yet stronger approaches.