ISSN 2278-9723
 

- 


A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath.

Abstract
Customarily, when classification turns into a worry information is scrambled before outsourcing to an administration supplier. Any product built crypto-logic develops later sent, to server type question handling with the encoded information, characteristically constrain inquiry expressiveness. Here, we present Trusted DB, an database outsourcing model which permits customers to complete sql inquiries use of security to execute also below administrative consistence imperatives along utilizing facilitated server, sealed trusted equipment in basic question preparing stages, in this manner expelling any constraints on the sort of bolstered questions. Regardless of the over cost, execution constraints equipment with trusted, here demonstrate expenses in particular inquiry which requests the greatness smaller compared to (present nor) future programming just instruments. Trusted DB is keep running with genuiene equipment and manufactured, and expenses were listed here

Key words: crypto-logic, DB


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath. A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY. . 2016; 4(1): 46-50. doi:10.31838/ijccts/04.01.08


Web Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath. A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY. http://www.ijccts.org/?mno=302643852 [Access: September 19, 2020]. doi:10.31838/ijccts/04.01.08


AMA (American Medical Association) Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath. A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY. . 2016; 4(1): 46-50. doi:10.31838/ijccts/04.01.08



Vancouver/ICMJE Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath. A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY. . (2016), [cited September 19, 2020]; 4(1): 46-50. doi:10.31838/ijccts/04.01.08



Harvard Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath (2016) A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY. , 4 (1), 46-50. doi:10.31838/ijccts/04.01.08



Turabian Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath. 2016. A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY. International Journal of Communication and Computer Technologies, 4 (1), 46-50. doi:10.31838/ijccts/04.01.08



Chicago Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath. "A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY." International Journal of Communication and Computer Technologies 4 (2016), 46-50. doi:10.31838/ijccts/04.01.08



MLA (The Modern Language Association) Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath. "A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY." International Journal of Communication and Computer Technologies 4.1 (2016), 46-50. Print. doi:10.31838/ijccts/04.01.08



APA (American Psychological Association) Style

R. Mohanasundaram Sadulla Shaik S.Murali P.Gopinath (2016) A TRUSTED DATABASE ON ENQUIPMENT WITH PROTECTION AND INFORMATION PRIVACY. International Journal of Communication and Computer Technologies, 4 (1), 46-50. doi:10.31838/ijccts/04.01.08





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles