Abstract
Cloud computing is a technology that promotes numerous configurable resources in which the data is stored and managed in a decentralized manner. However, as the data is out of the owner’s control, concerns have arisen regarding data confidentiality. Encryption schemes have been proposed to provide users with confidentiality for data stored in a cloud; however, many of these encryption algorithms are weak, enabling data security to be breached simply by compromising a weak encryption algorithm. We propose a combination of encryption algorithms and a distributed system to improve database confidentiality. This scheme distributes the database over the clouds based on the level of security that is provided by the utilized encryption algorithms. We analyzed our proposed system by designing and conducting experiments and by comparing our scheme with existing solutions. The results show that our scheme offers a highly secure approach providing users with data confidentiality and providing acceptable overhead performance.
This is an extended version of a preliminary conference paper that was accepted and presented in ICCA 2017 [2].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
P. Mell, T. Grance, and T. Grance, “The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology,” 2011.
A. Amjad, P. Bodorik, and S. Sampalli, “Improving database security in cloud computing by fragmentation of data,” in 2017 International Conference on Computer and Applications (ICCA). IEEE, Sept 2017, pp. 43–49.
H. Hacig, “Query Optimization in Encrypted Database,” pp. 43–55, 2005.
N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, D. Shasha, and I. Rocquencourt, “GhostDB : Querying Visible and Hidden Data Without Leaks,” 2007.
A. Hudic, S. Islam, P. Kieseberg, S. Rennert, and E. R. Weippl, “Data confidentiality using fragmentation in cloud computing,” International Journal of Pervasive Computing and Communications, vol. 9, no. 1, pp. 37–51, 2013. [Online]. Available: http://www.scopus.com/inward/record.url?eid=2-s2.0-84878829696{&}partnerID=tZOtx3y1
H. Hacig and C. Li, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,” vol. 7, 2002.
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, “Secure multidimensional range queries over outsourced data,” The VLDB Journal, vol. 21, no. 3, pp. 333–358, Aug 2011. [Online]. Available: http://link.springer.com/10.1007/s00778-011-0245-7
B. Hore, S. Mehrotra, and G. Tsudik, “A privacy-preserving index for range queries,” pp. 720–731, Aug 2004. [Online]. Available: http://dl.acm.org/citation.cfm?id=1316689.1316752
L. Bouganim and P. Pucheral, “Chip-Secured Data Access : Confidential Data on Untrusted Servers,” 2002.
S. Y. Ko and K. Jeon, “The HybrEx Model for Confidentiality and Privacy in Cloud Computing,” 2011.
K. Zhang, X. Zhou, Y. Chen, and X. Wang, “Sedic : Privacy-Aware Data Intensive Computing on Hybrid Clouds Categories and Subject Descriptors,” pp. 515–525, 2011.
Z. Zhou, H. Zhang, X. Du, P. Li, and X. Yu, “Prometheus : Privacy-Aware Data Retrieval on Hybrid Cloud,” pp. 2643–2651, 2013.
C. Zhang, E.-c. Chang, and R. H. C. Yap, “Tagged-MapReduce : A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds,” pp. 31–40, 2014.
K. Y. Oktay and S. Mehrotra, “SEMROD : Secure and Efficient MapReduce Over HybriD Clouds The University of Texas at Dallas,” pp. 153–166, 2015.
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB : Protecting Confidentiality with Encrypted Query Processing,” pp. 85–100, 2012.
E.-O. Blass, G. Noubir, and T. D. Vo-Huu, “Epic: Efficient privacy-preserving counting for mapreduce,” Cryptology ePrint Archive, Report 2012/452, 2012, http://eprint.iacr.org/2012/452.
J. J. Stephen, S. Savvides, R. Seidel, and P. Eugster, “Practical confidentiality preserving big data analysis,” in 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14). Philadelphia, PA: USENIX Association, Jun. 2014. [Online]. Available: https://www.usenix.org/conference/hotcloud14/workshop-program/presentation/stephen
T. Mayberry, E.-o. Blass, and A. H. Chan, “PIRMAP : Efficient Private Information Retrieval for MapReduce,” pp. 371–385, 2013.
E.-o. Blass, R. D. Pietro, R. Molva, and M. Onen, “PRISM — Privacy-Preserving Search in MapReduce,” pp. 180–200, 2012.
S. D. Tetali and T. Millstein, “MrCrypt : Static Analysis for Secure Cloud Computations,” pp. 271–286, 2013.
D. Liu, S. Wang, and C. I. C. T. Centre, “Programmable Order-Preserving Secure Index for Encrypted Database Query,” 2012 IEEE Fifth International Conference on Cloud Computing, pp. 502–509, Jun. 2012. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6253544
D. Xiaodong, S. David, and W. Adrian, “Practical Techniques for Searches on Encrypted Data.”
N. Singhal and J. P. S. Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization,” pp. 177–181, 2011.
W. Stallings, Cryptography and network security: Principles and practice. Upper Saddle River, N.J. : Prentice Hall, 1999.
P. Samarati and I. C. Society, “Protecting Respondents’ Identities in Microdata Release,” vol. 13, no. 6, pp. 1010–1027, 2001.
J. Daemen, The design of Rijndael : AES - the advanced encryption standard with 17 tables. Berlin [u.a.]: Springer, 2002.
J. Blomer, “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES),” Lecture notes in computer science., no. 2742, pp. 162 – 181, 2003.
E. M. Mohamed, “Enhanced Data Security Model for Cloud Computing,” pp. 12–17, 2012.
A. Arasu, S. Blanas, K. Eguro, M. Joglekar, R. Kaushik, D. Kossmann, R. Ramamurthy, P. Upadhyaya, and R. Venkatesan, “Secure database-as-a-service with Cipherbase,” Proceedings of the 2013 international conference on Management of data - SIGMOD ’13, p. 1033, 2013. [Online]. Available: http://dl.acm.org/citation.cfm?doid=2463676.2467797
G. Nalinipriya and R. Aswin Kumar, “Extensive medical data storage with prominent symmetric algorithms on cloud - A protected framework,” International Conference on Smart Structures and Systems - Icsss’13, pp. 171–177, Mar. 2013. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6623021
“Rackspace: The Leader in Hybrid Cloud.” [Online]. Available: http://www.rackspace.com/
Acknowledgments
This work is partially supported by Aljouf University represented by the Saudi Arabian Cultural Bureau in Canada. The authors would like to thank the anonymous reviewers for their constructive comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Alsirhani, A., Bodorik, P., Sampalli, S. (2018). Data Fragmentation Scheme: Improving Database Security in Cloud Computing. In: Alja’am, J., El Saddik, A., Sadka, A. (eds) Recent Trends in Computer Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-89914-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-89914-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-89913-8
Online ISBN: 978-3-319-89914-5
eBook Packages: Computer ScienceComputer Science (R0)