PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2014 | 2 | 885--889
Tytuł artykułu

Solution for Secure Private Data Storage in a Cloud

Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cloud computing and, more particularly, cloud databases, is a great technology for remote centralized data managing. However, there are some drawbacks including privacy issues, insider threats and potential database thefts. Full encryption of remote database does solve the problem, but disables many operations that can be held on DBMS side; therefore problem requires much more complex solution and specific encryptions. In this paper, we propose a solution for secure private data storage that protects confidentiality of user's data, stored in cloud. Solution uses order preserving and homomorphic proprietary developed encryptions. Proposed approach includes analysis of user's SQL queries, encryption of vulnerable data and decryption of data selection, returned from DBMS. We have validated our approach through the implementation of SQL queries and DBMS replies processor, which will be discussed in this paper. Secure cloud database architecture and used encryptions also will be covered.(original abstract)
Rocznik
Tom
2
Strony
885--889
Opis fizyczny
Twórcy
  • Novosibirsk State University
  • Novosibirsk State University
  • Novosibirsk State University
  • Novosibirsk State University
  • Novosibirsk State University
Bibliografia
  • Cloud Security Alliance. The Notorious Nine. Cloud Computing Top Threats in 2013. Available: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
  • Cloud Security Alliance. Top Threats to Cloud Computing V1.0 Cloud Security Alliance 2010.
  • Egorova V., Chechulina D., &Krendelev S. F. (2013) New View on Block Encryption (Unpublished) Available: https://db.tt/vnE9wfgj
  • Feldman A. J., Zeller W. P., Freedman M. J., and Felten E. W. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010.
  • Mahajan P., Setty S., Lee S., Clement A., Alvisi L., Dahlin M. and Walfish M. Depot: Cloud storage with minimal trust. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010.
  • Popa R. A., Redeld C. M. S., Zeldovich N., and Balakrishnan H.: CryptDB: Protecting Condentiality with Encrypted Query Processing proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011.
  • Privacy Rights Clearinghouse. Chronology of data breaches. Available: http://www.privacyrights.org/data-breach
  • Steinwandt R., Geiselmann W., and Endsuleit R., "Attacking a polynomial-based cryptosystem: Polly Cracker," International Journal of Information Security, vol. 1, no. 3, pp. 143-148, 2002.
  • William R Claycomb, Alex Nicoll: Insider Threats to Cloud Computing: Directions for New Research Challenges CERT 2012.
  • Xiao L., Bastani O., I-Ling Yen: Security Analisys for Order Preserving Encryption Schemes, January, 10, 2012.
  • Zhirov A. A., Zhirova O., & Krendelev S. F. (2013). Practical Fully Homomorphic Encryption over Polynomial Quotient Rings. In WorldCIS'13. London, UK.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171335471

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.