Secure Database as a Service for Cloud Tenants With no Exposure Of Unencrypted Data
Abstract
We propose a novel engineering that incorporates cloud database administrations with data mystery and the probability of executing concurrent operations on mixed data. This is the main course of action supporting geographically circled clients to interface particularly to a mixed cloud database, and to execute synchronous and free operations including those changing the database structure. The proposed design has the further favourable position of killing middle of the road intermediaries that breaking point the flexibility, accessibility, and scalability properties that are inborn in cloud-based arrangements. The adequacy of the proposed engineering is assessed through hypothetical investigations and broad test comes about in light of a model execution subject to the TPC-C standard benchmark for various quantities of customers and system latencies.
References
M. Armbrust et al., “A View of Cloud Computing,†Comm. of the ACM, vol. 53, no. 4, pp. 50-58, 2010.
W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud Computing,†Technical Report Special Publication 800-144, NIST, 2011.
A.J. Feldman, W.P. Zeller, M.J. Freedman, and E.W. Felten, “SPORC: Group Collaboration Using Untrusted Cloud Resources,†Proc. Ninth USENIX Conf. Operating Systems Design and Implementation, Oct. 2010.
J. Li, M. Krohn, D. Mazie`res, and D. Shasha, “Secure Untrusted Data Repository (SUNDR),†Proc. Sixth USENIX Conf. Opearting Systems Design and Implementation, Oct. 2004.
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish, “Depot: Cloud Storage with Minimal Trust,†ACM Trans. Computer Systems, vol. 29, no. 4, article 12, 2011.
H. Hacigu¨mu¨ s¸, B. Iyer, and S. Mehrotra, “Providing Database as a Service,†Proc. 18th IEEE Int’l Conf. Data Eng., Feb. 2002.
C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,†Proc. 41st Ann. ACM Symp. Theory of Computing, May 2009.
R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processing,†Proc. 23rd ACM Symp. Operating Systems Principles, Oct. 2011.
H. Hacigu¨mu¨ s¸, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,†Proc. ACM SIGMOD Int’l Conf. Management Data, June 2002.
J. Li and E. Omiecinski, “Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases,†Proc. 19th Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, Aug. 2005.
E. Mykletun and G. Tsudik, “Aggregation Queries in the Database-as-a-Service Model,†Proc. 20th Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, July/Aug. 2006.
D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally, “Database Management as a Service: Challenges and Opportunities,†Proc. 25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009.
V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motwani, “Distributing Data for Secure Database Services,†Proc. Fourth ACM Int’l Workshop Privacy and Anonymity in the Information Soc., Mar. 2011.
A. Shamir, “How to Share a Secret,†Comm. of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
M. Hadavi, E. Damiani, R. Jalili, S. Cimato, and Z. Ganjei, “AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing,†Proc. Fifth Int’l Workshop Autonomous and Spontaneous Security, Sept. 2013.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â