Abstract
In SaaS Applications, the data of tenants are stored in the untrusted service provider side, this case increases the risk of data leakage, and becomes the brief reason to prevent people and enterprise from taking SaaS mode for their applications. Correspondingly, confidentiality-guarantee has become the key factor of its large scale promotion. In this paper we propose a general secure mechanism that allows the sensitive data of tenants to be stored in encrypted mode, which guarantees data confidentiality on the assumption that application server is trusted, and then put forward the analysis of its security and performance.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-33068-1_20
Chapter PDF
References
Hacigumus, H., Hore, B., Iyer, B., Mehrotra, S.: Search on Encrypted Data. IBM Search Report 2007, 385–425 (2007)
Feng, D.G., Qin, Y.: Research on Attestation Method for Trust Computing Environment. Chinese Journal of Computers 31(9) (September 2008)
KaraBulut, Y., Nassi, I.: Secure Enterprise Services Consumption for SaaS Technology Plataforms. In: IEEE International Conference on Data Engineering (2009)
Zwyhun, N.: SaaS Data Security, Microsoft Report
Bouganim, L., Pucheral, P.: Chip-Secured Data Access: Confidential Data on Untrusted Servers. In: Proc., of VLDB (2002)
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Srivastava, U., Thomas, D., Xu, Y.: Two Can Keep a Secret: A Distributed Architecture for Secure Database Service. In: Proc. of CIDR (2005)
Goh, E.-J.: Secure Indexes. Technical report 2003/216, in IACR ePrint Cryptography Archive (2003)
Song, D., Wagner, D., Perrig, A.: Practical Techniques for Search on Encrypted Data. In: Proc. of IEEE SRSP (2000)
Hacigümüg, H., Iyer, B., Mehrotra, S.: Encrypted Database Integrity in Database Service Provider Model. In: Proc. of IFIP 17th World Computer Congress on Certification and Security in E-Services, CSES 2002 (2002)
Hacigumug, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In: Proc. Of ICDE (2002)
Hore, B., Mehrotra, S., Tsudik, G.: A Privacy-Preserving Index for Range Queries. In: Proc. of VLDB (2004)
Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)
Guo, C.J., Sun, W., Huang, Y., Wang, Z.H., Gao, B.: A Framework for Native Multi-Tenancy Application Develoment and Management. In: The 9th IEEE International Conference on E-Commerce
Reiner, S., Zhang, X.-L., Trent, J., Van Doorn, L.: Design and implementation of a TCG-based intergrety mesurement architecture. In: Proceeding of the 13th Usenix Security Symposium, San Diego, California, pp. 223–238 (2004)
Reiner, S., Van Doorn, L., Ward, J.P.: The role of TPM in enterprise security. IBM Research Report RC23368 (October 2004)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: SIGMOD 2004, Paris, France, June 13-18 (2004)
Wang, Z., Wang, W., Shi, B.: Efficient method of querying encrypt data. Computer Engineering and Applications 44(12), 29–33 (2008)
Lilin, M., Hong, L.: A Permission Model of SaaS System Based on RBAC. Computer Applications and Software 27(4), 42–44 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ren, G., Li, Q., Shi, Y., Cui, L. (2012). A Confidentiality-Guarantee Mechanism for SaaS. In: van Sinderen, M., Johnson, P., Xu, X., Doumeingts, G. (eds) Enterprise Interoperability. IWEI 2012. Lecture Notes in Business Information Processing, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33068-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-33068-1_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33067-4
Online ISBN: 978-3-642-33068-1
eBook Packages: Computer ScienceComputer Science (R0)