Skip to main content

Securing Outsourced Databases in the Cloud

  • Chapter
  • First Online:
Security, Privacy and Trust in Cloud Systems

Abstract

Cloud database services, such as Amazon Relational Database Service (RDS) and Microsoft SQL Azure, are attractive for companies to outsource their databases. In cloud database services, a shared platform (e.g., database server hardware and software) is provided to host multiple outsourced databases. By using cloud database services, a client can deploy databases quickly without making the large upfront investment on proprietary hardware and software. Hence, the cloud database services can help companies reduce the total cost of ownership on their database management. Moreover, due to the scalability and elasticity of cloud database services, an enterprise can dynamically increase or decrease the cloud resources allocated to its databases according to its business requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amazon Relational Database Service. http://aws.amazon.com/rds/

  2. Agrawal D, Abbadi A, Emekçi F, Metwally D (2009) Database management as a service: challenges and opportunities. In: Proceedings of the 25th international conference on data, engineering, pp 1709–1716

    Google Scholar 

  3. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data, SIGMOD’04, pp 563–574

    Google Scholar 

  4. Bertino E, Sandhu RS (2005) Database security-concepts, approaches, and challenges. IEEE Trans Dependable Secure Comput 2(1):2–19

    Article  Google Scholar 

  5. Boldyreva A, Chenette N, Lee Y, O’Neill A (2009) Order-preserving symmetric encryption. EUROCRYPT, pp 224–241

    Google Scholar 

  6. Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-LWE and security for Key dependent messages. CRYPTO 2011, pp 505–524

    Google Scholar 

  7. Ge T, Zdonik S (2007) Answering aggregation queries in a secure system model. In the 33rd international conference on very large data bases, pp 519–530

    Google Scholar 

  8. Gentry C (2009) Fully homomorphic encryption using ideal lattices. STOC 2009, pp 169–178

    Google Scholar 

  9. Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. VLDB 2004, pp 720–731

    Google Scholar 

  10. Liu D (2012) Homomorphic encryption for database querying. Australian Provisional Patent 2012902653 (filed by CSIRO)

    Google Scholar 

  11. Liu D, Wang S (2013) Nonlinear order preserving index for ncrypted database query in service cloud environments. Concurrency Comput: Pract Experience (in press)

    Google Scholar 

  12. Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, CCSW’11, pp 113–124

    Google Scholar 

  13. Microsoft SQL Azure Database. http://www.windowsazure.com/en-us/home/features/data-management/

  14. Oracle Database Cloud Service. https://cloud.oracle.com

  15. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. EUROCRYPT 1999, pp 223–238

    Google Scholar 

  16. Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (2011) CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM symposium on operating systems principles, SOSP’11, pp 85–100

    Google Scholar 

  17. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  18. van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. EUROCRYPT 2010, pp 24–43

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongxi Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Liu, D. (2014). Securing Outsourced Databases in the Cloud. In: Nepal, S., Pathan, M. (eds) Security, Privacy and Trust in Cloud Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38586-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38586-5_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38585-8

  • Online ISBN: 978-3-642-38586-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics