For access to this article, please select a purchase option:
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Your recommendation has been sent to your librarian.
Now a day’s most of the services are related to cloud and becoming more popular in using the services to tenants. Most importantly and famous service of cloud is Database as a Service (DaaS). This cloud service provides various resources as managing, using and administration such as software, hardware and tenants’ networks. The data and executing of queries in database are managed by the administrator from cloud service provider (CSP). Due to lack of trust on third party service provider the security and authentication issues are always facing by the tenants which is motivated us to write this paper. This paper shows the brief description about cryptographic algorithms, various types and query authentication on data. In the end the conclusion of the paper by proposing a new scheme that carry through the security and authentication of querying results of outsourcing cloud data.
Inspec keywords: outsourcing; cryptography; authorisation; data privacy; query processing; trusted computing; cloud computing; database management systems
Subjects: Internet software; Information retrieval techniques; Data security; Database management systems (DBMS)