In this abstract, we analyze the characteristics of difficult queries over databases and propose a novel method to detect such queries. We propose the Structured Robustness (SR) score, which measures the difficulty of a query based on the differences between the rankings of the same query over the original and noisy (corrupted) versions of the […]
A SECUREDBAAS ARCHITECTURE FOR DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES
In this abstract proposed a novel SecureDBaaS architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. It guarantees data confidentiality by allowing a cloud database server to execute concurrent SQL operations (not only read/write, but also modifications to the database structure) over encrypted data. It […]
FEDERATION OF SELFISH CLOUD PROVIDERS USING CAPACITY SHARING STRATEGY
One of the major problems that face the cloud providers (CPs) is the uncertainty in their work-loads; a spike in the requested VMs may result in higher service rejection rates and experienced delays by clients due to congested resources. A straightforward solution to overcome this problem is to over-provision the available resources to be able […]
CAPACITY SHARING STRATEGY IN A FEDERATION OF SELFISH CLOUD PROVIDERS
Federated clouds approach the CP problem by allowing peer CPs to share their unused capacities during low-demand periods and borrow spare capacity during peaks to maximize their profits and enhance their clients’ experience, with several strategies for capacity sharing in the federation. The proposed work models the interactions among the CPs as a repeated game […]
AUTHORIZED DUPLICATE CHECK SCHEME USING HYBRID CLOUD APPROACH
To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. Deduplication can take place at either the file level or the block level. For file-level deduplication, it eliminates duplicate copies of the same file. Deduplication can also take place at the block […]
MULTIVARIATE CORRELATION ANALYSIS BASED DOS ATTACK DETECTION
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. They impose intensive computation tasks to the victim by exploiting its system vulnerability or flooding it with huge amount […]
SET PREDICATES IN SQL: ENABLING SET-LEVEL COMPARISONS USING AGGREGATE FUNCTION AND BITMAP INDEX-BASED APPROACHES FOR DYNAMICALLY FORMED GROUPS
This abstract proposed to extend SQL with set predicates for an important class of analytical queries, which otherwise would be difficult to write and optimize. It designed two query evaluation approaches for set predicates, including an aggregate function-based approach and a bitmap index-based approach. Aggregate function-based approach processes set predicates in a way similar to […]
SECURE TWO-PARTY DIFFERENTIALLY PRIVATE DATA RELEASE IN THE SEMIHONEST ADVERSARY MODEL FOR VERTICALLY PARTITIONED DATA
In this abstract, we propose an algorithm to securely integrate person-specific sensitive data from two data providers, whereby the integrated data still retain the essential information for supporting data mining tasks. Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, differential privacy provides one […]
PACK: A NOVEL TRE TECHNIQUE BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
Many cloud customers, applying a judicious use of the cloud’s resources, are motivated to use various traffic reduction techniques, in particular traffic redundancy elimination (TRE), for reducing bandwidth costs. TRE is used to eliminate the transmission of redundant content and, there-fore, to significantly reduce the network cost. In this paper, we present PACK (Predictive ACKs), […]
SUPPORTING PRIVACY PROTECTION IN PROFILE-BASED PERSONALIZED WEB SEARCH
Personalized web search (PWS) is a general category of search techniques aiming at providing better search results, which are tailored for individual user needs. As the expense, user information has to be collected and analyzed to figure out the user intention behind the issued query. The solutions to PWS can generally be categorized into two […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- …
- 19
- Next Page »