Enhancing Security and Consistency for Cloud Databases
DOI:
https://doi.org/10.53555/nncse.v2i3.488Keywords:
Enhancing security, consistency, cloud databasesAbstract
Cloud computing is one of the most important research area. The cloud information don't seem to be safe and secured, because the third parties will access and acquire the knowledge from cloud at any time and will misuse the data or information of a particular user or organization and thus it is concerned, the information stored in cloud should come with the guarantee of security. The effectiveness of the planned design is evaluated through theoretical analysis and intensive experimental results supported a model implementation subject to the TPC-C (Transaction Processing Control) normal benchmark for various numbers of purchasers and network latencies. Information and table information area unit encrypted through constant encoding key before being saved. This encoding secret is known as a passkey. Only trusted clients that already know the key will rewrite the information and acquire data that is necessary to code and rewrite tenant knowledge. Each information is retrieved by purchasers through associated ID. The ID which is generated by the Message Authentication Code (MAC) function to the name of the object (database or table) described by the corresponding row. Deterministic MACfunction allows clients to retrieve the information of a given table by knowing its plaintext name. The advantage during this design is to boost smart Quality of Service (QoS) and Distributing knowledge among completely different suppliers and taking advantage of secret sharing.
References
M. Armbrust et al., “A View of Cloud Computing,” Comm. of theACM, vol. 53, no. 4, pp. 50-58, 2010.
W. Jansen and T. Grance, “Guidelines on Security and Privacy inPublic Cloud Computing,” Technical Report Special Publication800-144, NIST, 2011.
A.J. Feldman, W.P. Zeller, M.J. Freedman, and E.W. Felten,“SPORC: Group Collaboration Using Untrusted Cloud Resources,”Proc. Ninth USENIX Conf. Operating Systems Design andImplementation, Oct. 2010.
J. Li, M. Krohn, D. Mazie`res, and D. Shasha, “Secure UntrustedData Repository (SUNDR),” Proc. Sixth USENIX Conf. OpeartingSystems Design and Implementation, Oct. 2004.
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, andM. Walfish, “Depot: Cloud Storage with Minimal Trust,” ACMTrans. Computer Systems, vol. 29, no. 4, article 12, 2011.
H. Hacigu¨mu¨ s¸, B. Iyer, and S. Mehrotra, “Providing Database as aService,” Proc. 18th IEEE Int’l Conf. Data Eng., Feb. 2002.
C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,”Proc. 41st Ann. ACM Symp. Theory of Computing, May 2009.
R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan,“CryptDB: Protecting Confidentiality with Encrypted QueryProcessing,” Proc. 23rd ACM Symp. Operating Systems Principles,Oct. 2011.
H. Hacigu¨mu¨ s¸, B. Iyer, C. Li, and S. Mehrotra, “ExecutingSQL over Encrypted Data in the DatabaseService-ProviderModel,” Proc. ACM SIGMOD Int’l Conf. Management Data, June2002.
J. Li and E. Omiecinski, “Efficiency and Security Trade-Off inSupporting Range Queries on Encrypted Databases,” Proc. 19thAnn. IFIP WG 11.3 Working Conf. Data and Applications Security,Aug. 2005.
E. Mykletun and G. Tsudik, “Aggregation Queries in theDatabase-as-a-Service Model,” Proc. 20th Ann. IFIP WG 11.3Working Conf. Data and Applications Security, July/Aug. 2006.
D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally, “DatabaseManagement as a Service: Challenges and Opportunities,” Proc.25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009.
V. Ganapathy, D. Thomas, T. Feder, H. GarciaMolina, and R.Motwani, “Distributing Data for Secure Database Services,” Proc.Fourth ACM Int’l Workshop Privacy and Anonymity in the Information Soc., Mar. 2011.FERRETTI ET AL.: DISTRIBUTED, CONCURRENT, AND
INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES 445Fig. 9. TPC-C performance (latency equal to 40 ms). Fig. 10. TPC-C
performance (latency equal to 80 ms).
A. Shamir, “How to Share a Secret,” Comm. of the ACM,vol. 22, no. 11, pp. 612-613, 1979.
M. Hadavi, E. Damiani, R. Jalili, S. Cimato, and Z. Ganjei, “AS5: ASecure Searchable Secret Sharing Scheme for Privacy PreservingDatabase Outsourcing,” Proc. Fifth Int’l Workshop Autonomous andSpontaneous Security, Sept. 2013.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.