Solution for Secure Private Data Storage in a Cloud
Cloud computing and, more particularly, cloud databases, is a great technology for remote centralized data managing. However, there are some drawbacks including privacy issues, insider threats and potential database thefts. Full encryption of remote database does solve the problem, but disables many operations that can be held on DBMS side; therefore problem requires much more complex solution and specific encryptions. In this paper, we propose a solution for secure private data storage that protects confidentiality of user's data, stored in cloud. Solution uses order preserving and homomorphic proprietary developed encryptions. Proposed approach includes analysis of user's SQL queries, encryption of vulnerable data and decryption of data selection, returned from DBMS. We have validated our approach through the implementation of SQL queries and DBMS replies processor, which will be discussed in this paper. Secure cloud database architecture and used encryptions also will be covered.(original abstract)
- Cloud Security Alliance. The Notorious Nine. Cloud Computing Top Threats in 2013. Available: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
- Cloud Security Alliance. Top Threats to Cloud Computing V1.0 Cloud Security Alliance 2010.
- Egorova V., Chechulina D., &Krendelev S. F. (2013) New View on Block Encryption (Unpublished) Available: https://db.tt/vnE9wfgj
- Feldman A. J., Zeller W. P., Freedman M. J., and Felten E. W. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010.
- Mahajan P., Setty S., Lee S., Clement A., Alvisi L., Dahlin M. and Walfish M. Depot: Cloud storage with minimal trust. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010.
- Popa R. A., Redeld C. M. S., Zeldovich N., and Balakrishnan H.: CryptDB: Protecting Condentiality with Encrypted Query Processing proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011.
- Privacy Rights Clearinghouse. Chronology of data breaches. Available: http://www.privacyrights.org/data-breach
- Steinwandt R., Geiselmann W., and Endsuleit R., "Attacking a polynomial-based cryptosystem: Polly Cracker," International Journal of Information Security, vol. 1, no. 3, pp. 143-148, 2002.
- William R Claycomb, Alex Nicoll: Insider Threats to Cloud Computing: Directions for New Research Challenges CERT 2012.
- Xiao L., Bastani O., I-Ling Yen: Security Analisys for Order Preserving Encryption Schemes, January, 10, 2012.
- Zhirov A. A., Zhirova O., & Krendelev S. F. (2013). Practical Fully Homomorphic Encryption over Polynomial Quotient Rings. In WorldCIS'13. London, UK.