SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
Performance and cost evaluation of an adaptive 
encryption architecture for cloud databases 
Abstract: 
The cloud database as a service is a novel paradigm that can support several 
Internet-based applications, but its adoption requires the solution of information 
confidentiality problems. We propose a novel architecture for adaptive encryption 
of public cloud databases that offers an interesting alternative to the trade-off 
between the required data confidentiality level and the flexibility of the cloud 
database structures at design time. We demonstrate the feasibility and performance 
of the proposed solution through a software prototype. Moreover, we propose an 
original cost model that is oriented to the evaluation of cloud database services in 
plain and encrypted instances and that takes into account the variability of cloud 
prices and tenant workload during a medium-term period. 
Existing System: 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
The cloud computing paradigm is successfully converging as the fifth utility , but 
this positive trend is partially limited by concerns about information confidentiality 
and unclear costs over a medium-long term .We are interested in the Database as a 
Service paradigm (DBaaS) that poses several research challenges in terms of 
security and cost evaluation from a tenant’s point of view. Most results concerning 
encryption for cloud-based services are in applicable to the database paradigm. 
Other encryption schemes, which allow the execution of SQL operations over 
encrypted data, either suffer from performance limits or they require the choice of 
which encryption scheme must be adopted for each database column and 
SQL operations . 
Proposed System: 
The proposed architecture guarantees in an adaptive way the best level of data 
confidentiality for any database workload, even when the set of SQL queries 
dynamically changes. The adaptive encryption scheme, which was initially 
proposed for applications not referring to the cloud, encrypts each plain column 
into multiple encrypted columns, and each value is encapsulated into different 
layers of encryption, so that the outer layers guarantee higher confidentiality but 
support fewer computation capabilities with respect to the inner layers. we propose 
the first analytical cost estimation model for evaluating cloud database costs in 
plain and encrypted instances from a tenant’s point of view in a medium-term 
period. It takes also into account the variability of cloud prices and the possibility 
that the database workload may change during the evaluation period. This model is 
instanced with respect to several cloud provider offers and related real prices. As 
expected, adaptive encryption influences the costs related to storage size and
network usage of a database service. However, it is important that a tenant can 
anticipate the final costs in its period of interest, and can choose the best 
compromise between data confidentiality and expenses. 
Architecture : 
Implementation Modules: 
1. Adaptive encryption 
2. Metadata structure 
3. Encrypted database management 
4. Cost Estimation of cloud database services 
5. Cost model
6. Cloud pricing models 
7. Usage Estimation 
Adaptive encryption: 
The proposed system supports adaptive encryption methods for public cloud 
database service, where distributed and concurrent clients can issue direct SQL 
operations. By avoiding an architecture based on one [or] multiple intermediate 
servers between the clients and the cloud database, the proposed solution 
guarantees the same level of scalability and availability of the cloud service. Figure 
1 shows a scheme of the proposed architecture where each client executes an 
encryption engine that manages encryption operations. This software module is 
accessed by external user applications through the encrypted database interface. 
The proposed architecture manages five types of information. 
• plain data is the tenant information; 
• encrypted data is stored in the cloud database; 
• plain metadata represent the additional information that is necessary to execute 
SQL operations on encrypted data; 
• encrypted metadata is the encrypted version of the metadata that are stored in the 
cloud database; 
• master key is the encryption key of the encrypted metadata that is distributed to 
legitimate clients. 
Metadata structure:
Metadata include all information that allows a legitimate client knowing the master 
key to execute SQL operations over an encrypted database. They are organized and 
stored at a table-level granularity to reduce communication overhead for retrieval, 
and to improve management of concurrent SQL operations. We define all metadata 
information associated to a table as table metadata. Let us describe the structure of 
a table metadata .Table metadata includes the correspondence between the plain 
table name and the encrypted table name because each encrypted table name is 
randomly generated. Moreover, for each column of the original plain table 
it also includes a column metadata parameter containing the name and the data 
type of the corresponding plain column (e.g., integer, string, timestamp). Each 
column metadata is associated to one or more onion metadata, as many as the 
number of onions related to the column. 
Encrypted database management: 
The database administrator generates a master key, and uses it to initialize the 
architecture metadata. The master key is then distributed to legitimate clients. Each 
table creation requires the insertion of a new row in the metadata table. For each 
table creation, the administrator adds a column by specifying the column name, 
data type and confidentiality parameters. These last are the most important for this 
paper because they include the set of onions to be associated with the column, the 
starting layer (denoting the actual layer at creation time) and the field 
confidentiality of each onion. If the administrator does not specify the 
confidentiality parameters of a column, then they are automatically chosen by the 
client with respect to a tenant’s policy. Typically, the default policy assumes that 
the starting layer of each onion is set to its strongest encryption algorithm.
Cost Estimation of cloud database services: 
A tenant that is interested in estimating the cost of porting its database to a cloud 
platform. This porting is a strategic decision that must evaluate confidentiality 
issues and the related costs over a medium-long term. For these reasons, we 
propose a model that includes the overhead of encryption schemes and variability 
of database workload and cloud prices. The proposed model is general enough to 
be applied to the most popular cloud database services, such as Amazon Relational 
Database Service. 
Cost model: 
The cost of a cloud database service can be estimated as a function of three main 
parameters: 
Cost = f(T ime, Pricing,Usage) where: 
• Time: identifies the time interval T for which the tenant requires the service. 
• Pricing: refers to the prices of the cloud provider for subscription and resource 
usage; they typically tend to diminish during T . 
• Usage: denotes the total amount of resources used by the tenant; it typically 
increases during T .In order to detail the pricing attribute, it is important 
to specify that cloud providers adopt two subscription 
policies: the on-demand policy allows a tenant to payper-use and to withdraw its 
subscription anytime; the reservation policy requires the tenant to commit in 
advance for a reservation period. Hence, we distinguish between billing costs 
depending on resource usage and reservation costs denoting additional fees for 
commitment in exchange for lower pay-per-use prices. Billing costs are billed 
periodically to the tenant every billing period.
Cloud pricing models: 
Popular cloud database providers adopt two different billing functions, that we call 
linear L and tiered T . Let us consider a generic resource x, we define as xb its 
usage at the b-th billing period and px b its price. If the billing function is tiered, 
the cloud provider uses different prices for different ranges of resource usage. Let 
us define Z as the number of tiers, and [ˆx1, . . . , ˆxZ−1] as the set of thresholds 
that define all the tiers. The uptime and the storage billing functions of Amazon 
RDS are linear, while the network usage is a tiered billing function. On the other 
hand, the uptime billing functions of Azure SQL is linear, while the 
storage and network billing functions are tiered. 
Usage Estimation: 
The uptime is easily measurable, it is more difficult to estimate accurately the 
usage of storage and network , since they depend on the database structure, the 
workload and the use of encryption. We now propose a methodology for the 
estimation of storage and network usage due to encryption. For clarity, we define 
sp, se, sa as the storage usage in the plaintext, encrypted, and adaptively encrypted 
databases for one billing period. Similarly, np, ne, na represent network usage of 
the three configurations. We assume that the tenant knows the database structure 
and the query workload and we assume that each column a A stores ra values. By 
denoting as vp a the average storage size of each plaintext value stored in column 
a, we estimate the storage of the plaintext database.
System Configuration: 
HARDWARE REQUIREMENTS: 
Hardware - Pentium 
Speed - 1.1 GHz 
RAM - 1GB 
Hard Disk - 20 GB 
Floppy Drive - 1.44 MB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - SVGA 
SOFTWARE REQUIREMENTS: 
Operating System : Windows 
Technology : Java and J2EE 
Web Technologies : Html, JavaScript, CSS 
IDE : My Eclipse 
Web Server : Tomcat 
Tool kit : Android Phone 
Database : My SQL 
Java Version : J2SDK1.5
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an adaptive encryption architecture for cloud databases

More Related Content

What's hot

CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
Deeksha Arya
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
Venkat Projects
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
Raushan Kumar Singh
 
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR... COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
Nexgen Technology
 
Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...
Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...
Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...
AtakanAral
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
IAEME Publication
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
F01113945
F01113945F01113945
F01113945
IOSR Journals
 
Cost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentCost minimizing dynamic migration of content
Cost minimizing dynamic migration of content
Shakas Technologies
 
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
AtakanAral
 
QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...
QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...
QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...
Papitha Velumani
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computing
DIGVIJAY SHINDE
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
IJERA Editor
 
On network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloudOn network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloud
ssuser79fc19
 
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
1crore projects
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
Pvrtechnologies Nellore
 

What's hot (18)

CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR... COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 
Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...
Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...
Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
F01113945
F01113945F01113945
F01113945
 
Cost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentCost minimizing dynamic migration of content
Cost minimizing dynamic migration of content
 
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
 
QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...
QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...
QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computing
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
 
On network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloudOn network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloud
 
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 

Similar to 2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an adaptive encryption architecture for cloud databases

Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
Vijay Karan
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
Vijay Karan
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
IEEEFINALYEARSTUDENTPROJECT
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
IEEEFINALSEMSTUDENTPROJECTS
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
ZTech Proje
 
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
IJCI JOURNAL
 
Hire some ii towards privacy-aware cross-cloud service composition for big da...
Hire some ii towards privacy-aware cross-cloud service composition for big da...Hire some ii towards privacy-aware cross-cloud service composition for big da...
Hire some ii towards privacy-aware cross-cloud service composition for big da...
ieeepondy
 
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
nexgentechnology
 
Cost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentCost minimizing dynamic migration of content
Cost minimizing dynamic migration of content
nexgentech15
 
My Dissertation 2016
My Dissertation 2016My Dissertation 2016
My Dissertation 2016
Vrushali Lanjewar
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud Computing
Rahul Garg
 
Consistency as a service auditing cloud consistency
Consistency as a service  auditing cloud consistencyConsistency as a service  auditing cloud consistency
Consistency as a service auditing cloud consistency
Papitha Velumani
 
Jayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White PaperJayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade
 
IRJET- Cloud Cost Analyzer and Optimizer
IRJET- Cloud Cost Analyzer and OptimizerIRJET- Cloud Cost Analyzer and Optimizer
IRJET- Cloud Cost Analyzer and Optimizer
IRJET Journal
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...
Kumar Goud
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
ZTech Proje
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
chennaijp
 

Similar to 2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an adaptive encryption architecture for cloud databases (20)

Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
 
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
 
Hire some ii towards privacy-aware cross-cloud service composition for big da...
Hire some ii towards privacy-aware cross-cloud service composition for big da...Hire some ii towards privacy-aware cross-cloud service composition for big da...
Hire some ii towards privacy-aware cross-cloud service composition for big da...
 
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
 
Cost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentCost minimizing dynamic migration of content
Cost minimizing dynamic migration of content
 
My Dissertation 2016
My Dissertation 2016My Dissertation 2016
My Dissertation 2016
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud Computing
 
Consistency as a service auditing cloud consistency
Consistency as a service  auditing cloud consistencyConsistency as a service  auditing cloud consistency
Consistency as a service auditing cloud consistency
 
Jayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White PaperJayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White Paper
 
IRJET- Cloud Cost Analyzer and Optimizer
IRJET- Cloud Cost Analyzer and OptimizerIRJET- Cloud Cost Analyzer and Optimizer
IRJET- Cloud Cost Analyzer and Optimizer
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
 

More from IEEEFINALSEMSTUDENTPROJECTS

2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
IEEEFINALSEMSTUDENTPROJECTS
 

More from IEEEFINALSEMSTUDENTPROJECTS (17)

2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Scalable analytics for iaa s cloud a...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Qos aware geographic opportunistic r...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue ma...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Dynamic cloud pricing for revenue maxi...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Adaptive algorithm for minimizing clou...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
 

Recently uploaded

Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 

Recently uploaded (20)

Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 

2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an adaptive encryption architecture for cloud databases

  • 1. GLOBALSOFT TECHNOLOGIES Performance and cost evaluation of an adaptive encryption architecture for cloud databases Abstract: The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. We propose a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the required data confidentiality level and the flexibility of the cloud database structures at design time. We demonstrate the feasibility and performance of the proposed solution through a software prototype. Moreover, we propose an original cost model that is oriented to the evaluation of cloud database services in plain and encrypted instances and that takes into account the variability of cloud prices and tenant workload during a medium-term period. Existing System: IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. The cloud computing paradigm is successfully converging as the fifth utility , but this positive trend is partially limited by concerns about information confidentiality and unclear costs over a medium-long term .We are interested in the Database as a Service paradigm (DBaaS) that poses several research challenges in terms of security and cost evaluation from a tenant’s point of view. Most results concerning encryption for cloud-based services are in applicable to the database paradigm. Other encryption schemes, which allow the execution of SQL operations over encrypted data, either suffer from performance limits or they require the choice of which encryption scheme must be adopted for each database column and SQL operations . Proposed System: The proposed architecture guarantees in an adaptive way the best level of data confidentiality for any database workload, even when the set of SQL queries dynamically changes. The adaptive encryption scheme, which was initially proposed for applications not referring to the cloud, encrypts each plain column into multiple encrypted columns, and each value is encapsulated into different layers of encryption, so that the outer layers guarantee higher confidentiality but support fewer computation capabilities with respect to the inner layers. we propose the first analytical cost estimation model for evaluating cloud database costs in plain and encrypted instances from a tenant’s point of view in a medium-term period. It takes also into account the variability of cloud prices and the possibility that the database workload may change during the evaluation period. This model is instanced with respect to several cloud provider offers and related real prices. As expected, adaptive encryption influences the costs related to storage size and
  • 3. network usage of a database service. However, it is important that a tenant can anticipate the final costs in its period of interest, and can choose the best compromise between data confidentiality and expenses. Architecture : Implementation Modules: 1. Adaptive encryption 2. Metadata structure 3. Encrypted database management 4. Cost Estimation of cloud database services 5. Cost model
  • 4. 6. Cloud pricing models 7. Usage Estimation Adaptive encryption: The proposed system supports adaptive encryption methods for public cloud database service, where distributed and concurrent clients can issue direct SQL operations. By avoiding an architecture based on one [or] multiple intermediate servers between the clients and the cloud database, the proposed solution guarantees the same level of scalability and availability of the cloud service. Figure 1 shows a scheme of the proposed architecture where each client executes an encryption engine that manages encryption operations. This software module is accessed by external user applications through the encrypted database interface. The proposed architecture manages five types of information. • plain data is the tenant information; • encrypted data is stored in the cloud database; • plain metadata represent the additional information that is necessary to execute SQL operations on encrypted data; • encrypted metadata is the encrypted version of the metadata that are stored in the cloud database; • master key is the encryption key of the encrypted metadata that is distributed to legitimate clients. Metadata structure:
  • 5. Metadata include all information that allows a legitimate client knowing the master key to execute SQL operations over an encrypted database. They are organized and stored at a table-level granularity to reduce communication overhead for retrieval, and to improve management of concurrent SQL operations. We define all metadata information associated to a table as table metadata. Let us describe the structure of a table metadata .Table metadata includes the correspondence between the plain table name and the encrypted table name because each encrypted table name is randomly generated. Moreover, for each column of the original plain table it also includes a column metadata parameter containing the name and the data type of the corresponding plain column (e.g., integer, string, timestamp). Each column metadata is associated to one or more onion metadata, as many as the number of onions related to the column. Encrypted database management: The database administrator generates a master key, and uses it to initialize the architecture metadata. The master key is then distributed to legitimate clients. Each table creation requires the insertion of a new row in the metadata table. For each table creation, the administrator adds a column by specifying the column name, data type and confidentiality parameters. These last are the most important for this paper because they include the set of onions to be associated with the column, the starting layer (denoting the actual layer at creation time) and the field confidentiality of each onion. If the administrator does not specify the confidentiality parameters of a column, then they are automatically chosen by the client with respect to a tenant’s policy. Typically, the default policy assumes that the starting layer of each onion is set to its strongest encryption algorithm.
  • 6. Cost Estimation of cloud database services: A tenant that is interested in estimating the cost of porting its database to a cloud platform. This porting is a strategic decision that must evaluate confidentiality issues and the related costs over a medium-long term. For these reasons, we propose a model that includes the overhead of encryption schemes and variability of database workload and cloud prices. The proposed model is general enough to be applied to the most popular cloud database services, such as Amazon Relational Database Service. Cost model: The cost of a cloud database service can be estimated as a function of three main parameters: Cost = f(T ime, Pricing,Usage) where: • Time: identifies the time interval T for which the tenant requires the service. • Pricing: refers to the prices of the cloud provider for subscription and resource usage; they typically tend to diminish during T . • Usage: denotes the total amount of resources used by the tenant; it typically increases during T .In order to detail the pricing attribute, it is important to specify that cloud providers adopt two subscription policies: the on-demand policy allows a tenant to payper-use and to withdraw its subscription anytime; the reservation policy requires the tenant to commit in advance for a reservation period. Hence, we distinguish between billing costs depending on resource usage and reservation costs denoting additional fees for commitment in exchange for lower pay-per-use prices. Billing costs are billed periodically to the tenant every billing period.
  • 7. Cloud pricing models: Popular cloud database providers adopt two different billing functions, that we call linear L and tiered T . Let us consider a generic resource x, we define as xb its usage at the b-th billing period and px b its price. If the billing function is tiered, the cloud provider uses different prices for different ranges of resource usage. Let us define Z as the number of tiers, and [ˆx1, . . . , ˆxZ−1] as the set of thresholds that define all the tiers. The uptime and the storage billing functions of Amazon RDS are linear, while the network usage is a tiered billing function. On the other hand, the uptime billing functions of Azure SQL is linear, while the storage and network billing functions are tiered. Usage Estimation: The uptime is easily measurable, it is more difficult to estimate accurately the usage of storage and network , since they depend on the database structure, the workload and the use of encryption. We now propose a methodology for the estimation of storage and network usage due to encryption. For clarity, we define sp, se, sa as the storage usage in the plaintext, encrypted, and adaptively encrypted databases for one billing period. Similarly, np, ne, na represent network usage of the three configurations. We assume that the tenant knows the database structure and the query workload and we assume that each column a A stores ra values. By denoting as vp a the average storage size of each plaintext value stored in column a, we estimate the storage of the plaintext database.
  • 8. System Configuration: HARDWARE REQUIREMENTS: Hardware - Pentium Speed - 1.1 GHz RAM - 1GB Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5