SlideShare a Scribd company logo
1 of 4
Towards Differential Query Services in Cost-Efficient Clouds 
Towards Differential Query Services in Cost-Efficient Clouds 
Cloud computing as an emerging technology trend is expected to reshape the advances in 
information technology.In a cost-efficient cloud environment, a user can tolerate a certain degree 
of delay while retrieving information from the cloud to reduce costs. In this paper, we address 
two fundamental issues in such an environment: privacy and efficiency. We first review a private 
keyword-based file retrieval scheme that was originally proposed by Ostrovsky. Their scheme 
allows a user to retrieve files of interest from an untrusted server without leaking any 
information. The main drawback is that it will cause a heavy querying overhead incurred on the 
cloud and thus goes against the original intention of cost efficiency. In this paper, we present 
three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying 
overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a 
higher ranked query can retrieve a higher percentage of matched files. A user can retrieve files 
on demand by choosing queries of different ranks. This feature is useful when there are a large 
number of matched files, but the user only needs a small subset of them. Under different 
parameter settings, extensive evaluations have been conducted on both analytical models and on 
a real cloud environment, in order to examine the effectiveness of our schemes. 
Private searching was proposed by Ostrovsky et al. Which allows a user to retrieve files of 
interest from an untrusted server without leaking any information. Otherwise, the cloud will 
learn that certain files, without processing, are of no interest to the user. Commercial clouds 
follow a pay-as-you-go model, where the customer is billed for different operations such as 
bandwidth, CPU time, and so on. Solutions that incur excessive computation and communication 
costs are unacceptable to customers. To make private searching applicable in a cloud 
environment, our previous work designed a cooperate private searching protocol (COPS), where 
a proxy server, called the aggregation and distribution layer (ADL), is introduced.between the 
users and the cloud. The ADL deployed inside an organization has two main functionalities: 
aggregating user queries and distributing search results. Under the ADL, the computation cost 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Towards Differential Query Services in Cost-Efficient Clouds 
incurred on the cloud can be largely reduced, since the cloud only needs to execute a combined 
query once, no matter how many users are executing queries.Furthermore, the communication 
cost incurred on the cloud will also be reduced, since files shared by the users need to be 
returned only once. Most importantly, by using a series of sec ure functions, COPS can protect 
user privacy from the ADL, the cloud, and other users. 
DISADVANTAGES OF EXISTING SYSTEM: 
1. Ostrovsky scheme has a high computational cost, since it requires the cloud to process the 
query on every file in a collection. 
2. It will quickly become a performance bottleneck when the cloud needs to process thousands 
of queries over a collection of hundreds of thousands of files. We argue that subsequently 
proposed improvements, like also have the same drawback. 
In this paper, we introduce a novel concept, differential query services, to COPS, where the users 
are allowed to personally decide how many matched files will be returned. This is motivated by 
the fact that under certain cases, there are a lot of files ma tching a userโ€™s query, but the user is 
interested in only a certain percentage of matched files In the Ostrovsky scheme, the cloud will 
have to return 2,000 files. In the COPS scheme, the cloud will have to return 1,000 files. In our 
scheme, the cloud only needs to return 200 files. Therefore, by allowing the users to retrieve 
matched files on demand, the bandwidth consumed in the cloud can be largely reduced. Efficient 
Information retrieval for Ranked Query (EIRQ), in which each user can choose the rank of his 
query to determine the percentage of matched files to be returned. The basic idea of EIRQ is to 
construct a privacy-preserving mask matrix that allows the cloud to filter out a certain percentage 
of matched files before returning to the ADL. This is not a trivial work, since the cloud needs to 
correctly filter out files according to the rank of queries without knowing anything about user 
privacy. 
ADVANTAGES OF PROPOSED SYSTEM: 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Towards Differential Query Services in Cost-Efficient Clouds 
1. The cloud only needs to return 200 files. Therefore, by allowing the users to retrieve matched 
files on demand, the bandwidth consumed in the cloud can be largely reduced. 
2. We provide two solutions to adjust related parameters; one is based on the Ostrovsky 
scheme, and the other is based on Bloom filters. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
๏ƒ˜ System : Pentium IV 2.4 GHz. 
๏ƒ˜ Hard Disk : 40 GB. 
๏ƒ˜ Floppy Drive : 1.44 Mb. 
๏ƒ˜ Monitor : 15 VGA Colour. 
๏ƒ˜ Mouse : Logitech. 
๏ƒ˜ Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
๏ƒ˜ Operating system : Windows XP/7. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Towards Differential Query Services in Cost-Efficient Clouds 
๏ƒ˜ Coding Language : JAVA/J2EE 
๏ƒ˜ IDE : Netbeans 7.4 
๏ƒ˜ Database : MYSQL 
Qin Liu, Chiu C. Tan, Member, IEEE, Jie Wu, Fellow, IEEE, and Guojun Wang, Member, IEEE 
โ€œTowards Diffe rential Que ry Services in Cost-Efficient Cloudsโ€ IEEE TRANSACTIONS 
ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 25,NO. 6,JUNE 2014 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot

A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
ย 
Bionimbus - An Overview (2010-v6)
Bionimbus - An Overview (2010-v6)Bionimbus - An Overview (2010-v6)
Bionimbus - An Overview (2010-v6)Robert Grossman
ย 
Large Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefLarge Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefRobert Grossman
ย 
Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...
Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...
Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...Robert Grossman
ย 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secureIJAEMSJORNAL
ย 
Open Cloud Consortium: An Update (04-23-10, v9)
Open Cloud Consortium: An Update (04-23-10, v9)Open Cloud Consortium: An Update (04-23-10, v9)
Open Cloud Consortium: An Update (04-23-10, v9)Robert Grossman
ย 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
ย 
An4201262267
An4201262267An4201262267
An4201262267IJERA Editor
ย 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
ย 
Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPIJSRD
ย 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
ย 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
ย 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudIAEME Publication
ย 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...IOSR Journals
ย 
Private cloud storage implementation using OpenStack Swift
Private cloud storage implementation using OpenStack SwiftPrivate cloud storage implementation using OpenStack Swift
Private cloud storage implementation using OpenStack SwiftTELKOMNIKA JOURNAL
ย 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computingmrzahidfaiz.blogspot.com
ย 

What's hot (16)

A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
ย 
Bionimbus - An Overview (2010-v6)
Bionimbus - An Overview (2010-v6)Bionimbus - An Overview (2010-v6)
Bionimbus - An Overview (2010-v6)
ย 
Large Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefLarge Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster Relief
ย 
Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...
Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...
Lessons Learned from a Year's Worth of Benchmarking Large Data Clouds (Robert...
ย 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secure
ย 
Open Cloud Consortium: An Update (04-23-10, v9)
Open Cloud Consortium: An Update (04-23-10, v9)Open Cloud Consortium: An Update (04-23-10, v9)
Open Cloud Consortium: An Update (04-23-10, v9)
ย 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
ย 
An4201262267
An4201262267An4201262267
An4201262267
ย 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
ย 
Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDP
ย 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
ย 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
ย 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
ย 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
ย 
Private cloud storage implementation using OpenStack Swift
Private cloud storage implementation using OpenStack SwiftPrivate cloud storage implementation using OpenStack Swift
Private cloud storage implementation using OpenStack Swift
ย 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
ย 

Viewers also liked

Design of an information system for HUNETs
Design of an information system for HUNETsDesign of an information system for HUNETs
Design of an information system for HUNETsrffrankzr
ย 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar portAmar Raj
ย 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process miningShakas Technologies
ย 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...IEEEGLOBALSOFTSTUDENTSPROJECTS
ย 
JPJ1420 Efficient Prediction of Difficult Keyword Queries over Databases
JPJ1420  Efficient Prediction of Difficult Keyword Queries over DatabasesJPJ1420  Efficient Prediction of Difficult Keyword Queries over Databases
JPJ1420 Efficient Prediction of Difficult Keyword Queries over Databaseschennaijp
ย 
An exploration of geographic authentication schemes
An exploration of geographic authentication schemesAn exploration of geographic authentication schemes
An exploration of geographic authentication schemesShakas Technologies
ย 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksPapitha Velumani
ย 
expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...swathi78
ย 
scalable distributed service integrity attestation for software-as-a-service ...
scalable distributed service integrity attestation for software-as-a-service ...scalable distributed service integrity attestation for software-as-a-service ...
scalable distributed service integrity attestation for software-as-a-service ...swathi78
ย 
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing PlatformJPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platformchennaijp
ย 
Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...LeMeniz Infotech
ย 
Scalable distributed service integrity for SaaS
Scalable distributed service integrity for SaaSScalable distributed service integrity for SaaS
Scalable distributed service integrity for SaaSshreyank byadagi
ย 
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery EngineJPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Enginechennaijp
ย 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...IEEEFINALYEARSTUDENTPROJECT
ย 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Papitha Velumani
ย 
JPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
JPJ1453 Web Service Recommendation via Exploiting Location and QoS InformationJPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
JPJ1453 Web Service Recommendation via Exploiting Location and QoS Informationchennaijp
ย 
accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...swathi78
ย 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksLeMeniz Infotech
ย 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process miningIGEEKS TECHNOLOGIES
ย 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPapitha Velumani
ย 

Viewers also liked (20)

Design of an information system for HUNETs
Design of an information system for HUNETsDesign of an information system for HUNETs
Design of an information system for HUNETs
ย 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar port
ย 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process mining
ย 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
ย 
JPJ1420 Efficient Prediction of Difficult Keyword Queries over Databases
JPJ1420  Efficient Prediction of Difficult Keyword Queries over DatabasesJPJ1420  Efficient Prediction of Difficult Keyword Queries over Databases
JPJ1420 Efficient Prediction of Difficult Keyword Queries over Databases
ย 
An exploration of geographic authentication schemes
An exploration of geographic authentication schemesAn exploration of geographic authentication schemes
An exploration of geographic authentication schemes
ย 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
ย 
expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...
ย 
scalable distributed service integrity attestation for software-as-a-service ...
scalable distributed service integrity attestation for software-as-a-service ...scalable distributed service integrity attestation for software-as-a-service ...
scalable distributed service integrity attestation for software-as-a-service ...
ย 
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing PlatformJPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
ย 
Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...
ย 
Scalable distributed service integrity for SaaS
Scalable distributed service integrity for SaaSScalable distributed service integrity for SaaS
Scalable distributed service integrity for SaaS
ย 
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery EngineJPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
ย 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
ย 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
ย 
JPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
JPJ1453 Web Service Recommendation via Exploiting Location and QoS InformationJPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
JPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
ย 
accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...
ย 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
ย 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process mining
ย 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
ย 

Similar to towards differential query services in cost-efficient clouds

JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...IEEEGLOBALSOFTTECHNOLOGIES
ย 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsieeepondy
ย 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
ย 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...ASAITHAMBIRAJAA
ย 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
ย 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsVijay Karan
ย 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
ย 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
ย 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
ย 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
ย 
An Enhanced Cloud Backed Frugal File System
An Enhanced Cloud Backed Frugal File SystemAn Enhanced Cloud Backed Frugal File System
An Enhanced Cloud Backed Frugal File SystemIRJET Journal
ย 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
ย 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
ย 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on CloudSupriya .
ย 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
ย 
Consistency as a service auditing cloud consistency
Consistency as a service  auditing cloud consistencyConsistency as a service  auditing cloud consistency
Consistency as a service auditing cloud consistencyPapitha Velumani
ย 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
ย 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDijsrd.com
ย 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
ย 

Similar to towards differential query services in cost-efficient clouds (20)

JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
ย 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
ย 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
ย 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
ย 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
ย 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
ย 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
ย 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
ย 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
ย 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
ย 
An Enhanced Cloud Backed Frugal File System
An Enhanced Cloud Backed Frugal File SystemAn Enhanced Cloud Backed Frugal File System
An Enhanced Cloud Backed Frugal File System
ย 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
ย 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
ย 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on Cloud
ย 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
ย 
Consistency as a service auditing cloud consistency
Consistency as a service  auditing cloud consistencyConsistency as a service  auditing cloud consistency
Consistency as a service auditing cloud consistency
ย 
H017144148
H017144148H017144148
H017144148
ย 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
ย 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
ย 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
ย 

More from swathi78

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
ย 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
ย 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationswathi78
ย 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service compositionswathi78
ย 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...swathi78
ย 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksswathi78
ย 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
ย 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networksswathi78
ย 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingswathi78
ย 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signaturesswathi78
ย 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...swathi78
ย 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksswathi78
ย 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...swathi78
ย 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networksswathi78
ย 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionswathi78
ย 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engineswathi78
ย 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
ย 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemswathi78
ย 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
ย 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...swathi78
ย 

More from swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
ย 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
ย 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
ย 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
ย 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
ย 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
ย 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
ย 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
ย 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
ย 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
ย 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
ย 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
ย 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
ย 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
ย 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
ย 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
ย 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
ย 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
ย 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
ย 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
ย 

Recently uploaded

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
ย 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
ย 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
ย 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
ย 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ย 

towards differential query services in cost-efficient clouds

  • 1. Towards Differential Query Services in Cost-Efficient Clouds Towards Differential Query Services in Cost-Efficient Clouds Cloud computing as an emerging technology trend is expected to reshape the advances in information technology.In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, we address two fundamental issues in such an environment: privacy and efficiency. We first review a private keyword-based file retrieval scheme that was originally proposed by Ostrovsky. Their scheme allows a user to retrieve files of interest from an untrusted server without leaking any information. The main drawback is that it will cause a heavy querying overhead incurred on the cloud and thus goes against the original intention of cost efficiency. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can retrieve a higher percentage of matched files. A user can retrieve files on demand by choosing queries of different ranks. This feature is useful when there are a large number of matched files, but the user only needs a small subset of them. Under different parameter settings, extensive evaluations have been conducted on both analytical models and on a real cloud environment, in order to examine the effectiveness of our schemes. Private searching was proposed by Ostrovsky et al. Which allows a user to retrieve files of interest from an untrusted server without leaking any information. Otherwise, the cloud will learn that certain files, without processing, are of no interest to the user. Commercial clouds follow a pay-as-you-go model, where the customer is billed for different operations such as bandwidth, CPU time, and so on. Solutions that incur excessive computation and communication costs are unacceptable to customers. To make private searching applicable in a cloud environment, our previous work designed a cooperate private searching protocol (COPS), where a proxy server, called the aggregation and distribution layer (ADL), is introduced.between the users and the cloud. The ADL deployed inside an organization has two main functionalities: aggregating user queries and distributing search results. Under the ADL, the computation cost Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Towards Differential Query Services in Cost-Efficient Clouds incurred on the cloud can be largely reduced, since the cloud only needs to execute a combined query once, no matter how many users are executing queries.Furthermore, the communication cost incurred on the cloud will also be reduced, since files shared by the users need to be returned only once. Most importantly, by using a series of sec ure functions, COPS can protect user privacy from the ADL, the cloud, and other users. DISADVANTAGES OF EXISTING SYSTEM: 1. Ostrovsky scheme has a high computational cost, since it requires the cloud to process the query on every file in a collection. 2. It will quickly become a performance bottleneck when the cloud needs to process thousands of queries over a collection of hundreds of thousands of files. We argue that subsequently proposed improvements, like also have the same drawback. In this paper, we introduce a novel concept, differential query services, to COPS, where the users are allowed to personally decide how many matched files will be returned. This is motivated by the fact that under certain cases, there are a lot of files ma tching a userโ€™s query, but the user is interested in only a certain percentage of matched files In the Ostrovsky scheme, the cloud will have to return 2,000 files. In the COPS scheme, the cloud will have to return 1,000 files. In our scheme, the cloud only needs to return 200 files. Therefore, by allowing the users to retrieve matched files on demand, the bandwidth consumed in the cloud can be largely reduced. Efficient Information retrieval for Ranked Query (EIRQ), in which each user can choose the rank of his query to determine the percentage of matched files to be returned. The basic idea of EIRQ is to construct a privacy-preserving mask matrix that allows the cloud to filter out a certain percentage of matched files before returning to the ADL. This is not a trivial work, since the cloud needs to correctly filter out files according to the rank of queries without knowing anything about user privacy. ADVANTAGES OF PROPOSED SYSTEM: Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Towards Differential Query Services in Cost-Efficient Clouds 1. The cloud only needs to return 200 files. Therefore, by allowing the users to retrieve matched files on demand, the bandwidth consumed in the cloud can be largely reduced. 2. We provide two solutions to adjust related parameters; one is based on the Ostrovsky scheme, and the other is based on Bloom filters. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: ๏ƒ˜ System : Pentium IV 2.4 GHz. ๏ƒ˜ Hard Disk : 40 GB. ๏ƒ˜ Floppy Drive : 1.44 Mb. ๏ƒ˜ Monitor : 15 VGA Colour. ๏ƒ˜ Mouse : Logitech. ๏ƒ˜ Ram : 512 Mb. SOFTWARE REQUIREMENTS: ๏ƒ˜ Operating system : Windows XP/7. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Towards Differential Query Services in Cost-Efficient Clouds ๏ƒ˜ Coding Language : JAVA/J2EE ๏ƒ˜ IDE : Netbeans 7.4 ๏ƒ˜ Database : MYSQL Qin Liu, Chiu C. Tan, Member, IEEE, Jie Wu, Fellow, IEEE, and Guojun Wang, Member, IEEE โ€œTowards Diffe rential Que ry Services in Cost-Efficient Cloudsโ€ IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 25,NO. 6,JUNE 2014 Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in