Abstract
Onset of cloud computing allowed various IT services to be outsourced to cloud service providers (CSP). This includes the management and storage of users’ structured or unstructured data called Database as a Service (DBaaS). However, users need to trust the CSP to protect their data, which is inherent in all cloud-based services. Enterprises and Small-to-Medium Businesses (SMB) see this as a roadblock in adopting cloud services because they do not have full control of the security of the stored data on the cloud. Due to these security issues, one possible solution for the data owners is to store their sensitive data in encrypted form. However, to take full advantage of cloud database as service, FHE enabled SQL processing is a promising solution, which will be elaborated in this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahn G-J, Sandhu R (2000) Role-based authorization constraints specification. ACM Trans Inf Syst Secur 3:207–226
Balduzzi M, Zaddach J, Balzarotti D, Kirda E, Loureiro S (2012) A security analysis of Amazon’s elastic compute cloud service. In: SAC
Bernardo D, Assumpçao G (2009) Advanced SQL injection to operating system full control. In: Black hat Europe
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Advances in cryptology – EUROCRYPT 2004, vol 3027. Lecture notes in computer science. Springer, Berlin, pp 506–522
Bradford Contel (2018) 7 most infamous cloud security breaches. StorageCraft Technology Corporation from https://blog.storagecraft.com/7-infamous-cloud-security-breaches/
Chatterjee A, SenGupta I (2018) Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Trans Cloud Comput 6(1):287–300
Chatterjee A, Manish Kaushal, SenGupta I (2013) Accelerating sorting of fully homomorphic encrypted data. INDOCRYPT 2013. Springer, Berlin, pp 262–273
Egorov M, Wilkison M (2016) ZeroDB white paper. CoRR abs arXiv:1602.07168
Felipe MR, Aung KMM, Ye X, Yonggang W (2015) StealthyCRM: a secure cloud crm system application that supports fully homomorphic database encryption. In: International conference on cloud computing research and innovation (ICCCRI)
FHE library HElib (2018). https://github.com/shaih/HElib
Grubbs P, McPherson R, Naveed M, Ristenpart T, Shmatikov V (2016) Breaking web applications built on top of encrypted data. In: CCS
Grubbs P, Ristenpart T, Shmatikov V (2017) Why your encrypted database is not secure. In: HotOS. pp 162–168
Guan Q, Zhang Z, Fu S (2011) Proactive failure management by integrated unsupervised and semi-supervised learning for dependable cloud systems. In: Proceeding 2011 6th international conference on availability reliability and security, ARES ’11. Washington, DC, USA, pp 83–90
Huang C-T, Huan L, Qin Z, Yuan H, Zhou L, Varadharajan V, Jay Kuo C-C (2014) Survey on securing data storage in the cloud. ATSIP. https://doi.org/10.1017/ATSIP.2014.6
Juels A, Kaliski BS Jr (2007) Pors: proofs of retrievability for large files. In: Proceeding of 14th ACM conference on computer and communications security, CCS ’07. pp 584–597
Kumar RS, Saxena A (2011) Data integrity proofs in cloud storage. In: 2011 3rd International conference on communication systems and networks (COMSNETS), pp 1–4
Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Advances in cryptology EUROCRYPT 2010, vol 6110. Lecture notes in computer science. Springer, Berlin, pp 62–91
Lillibridge M, Elnikety S, Birrell A, Burrows M, Isard M (2003) A cooperative Internet backup scheme. In: Proceeding of USENIX annual technical conference, ATEC ’03. USENIX Association, Berkeley, CA, USA, pp 285–298
Lillibridge M, Elnikety S, Birrell A, Burrows M, Isard M, Ateniese G et al (2007) Provable data possession at untrusted stores. In: Proceeding of 14th ACM conference on computer and communications security, CCS ’07. New York, NY, USA, pp 598–609
Miguel RF, Dash A, Aung KMM (2016) A study of secure dbaas with encrypted data transactions. In: Proceedings of the 2nd international conference on communication and information processing, ICCIP ’16. pp 43–47
Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (2011) CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM symposium on operating systems principles (SOSP). Cascais, Portugal
Ristenpart T, Yilek S (2010) When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography. In: NDSS
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology – EUROCRYPT 2005. 24th Annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26. Lecture notes in computer science, vol 3494. Springer, Berlin, pp 457–473
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47
Storer MW, Greenan K, Long DDE, Miller EL (2008) Secure data deduplication. In Proceeding of 4th ACM international workshop on storage security and survivability, storageSS ’08. New York, NY, USA, pp 1–10
Transaction processing performance council, TPC Benchmark H. http://www.tpc.org/tpc_documents_current_versions/current_specifications.asp. Accessed 22 Jul 2018
Verizon data breach incident report (2016). https://regmedia.co.uk/2016/05/12/dbir2016.pdf
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Chatterjee, A., Aung, K.M.M. (2019). Secure Database Handling. In: Fully Homomorphic Encryption in Real World Applications. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-6393-1_5
Download citation
DOI: https://doi.org/10.1007/978-981-13-6393-1_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6392-4
Online ISBN: 978-981-13-6393-1
eBook Packages: EngineeringEngineering (R0)