CryptDBaaS Query Over Encrypted DBaaS Without Third-Party

被引:0
|
作者
Draidi, Fadi [1 ]
Hmedat, Mohammad [1 ]
Abwe, Barakat [1 ]
Atrash, Amr [1 ]
机构
[1] An Najah Natl Univ, IT Fac, Nablus, Palestine
来源
ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS | 2018年
关键词
Cloud; DBaaS; DBaaS security; Cloud security; Encrypted database; Database security;
D O I
10.1145/3231053.3231068
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information storage systems usually take great care for protecting their sensitive or confidential data, even users personal data. Hence the need to implement the concept of information security as part of the system. Information security primary focus is the balanced protection of the confidentiality, integrity and availability of stored data (CIA). Cloud system is one of the platforms that provides a database as a service (DBaaS), typically it takes care of scalability and high availability of the database. The confidentiality and integrity of stored data is still not guaranteed by some cloud systems because there is no trust between data owners and third-party platforms (Cloud systems). CryptDBaaS is a security model integrating cloud computing with cryptography to provide a security mechanism for data owners, which aims to guarantee the confidentiality of stored data in the cloud from unauthorized access or misuse of data from third party. CryptDBaaS model illustrates how to encrypt your data before storing it using secure and suitable encryption algorithms based on data type and allows to execute queries and performs some mathematical and logical operations over encrypted database. CryptDBaaS is evaluated by conducting a simulation to measure performance and accuracy of queries and search techniques CryptDBaaS provides. Evaluation step shows that CryptDBaaS has a high performance with respect to the encryption and search algorithms. The queries are executed as if they were executed over plain text data, so the obtained accuracy is 100% for all queries and operators except the search one which has 50% or 100% of accuracy based on chosen technique.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Data popularity-based encrypted deduplication scheme without third-party servers
    Ha, Guanxiong
    Jia, Qiaowen
    Chen, Hang
    Jia, Chunfu
    Tongxin Xuebao/Journal on Communications, 2022, 43 (08): : 17 - 29
  • [2] QR2: A Third-party Query Reranking Service Over Web Databases
    Gunasekaran, Yeshwanth D.
    Asudeh, Abolfazl
    Hasani, Sona
    Zhang, Nan
    Jaoua, Ali
    Das, Gautam
    2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1653 - 1656
  • [3] Using third-party purchasing to push third-party logistics
    Long, JS
    Zhao, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404
  • [4] Third Party Data Clustering Over Encrypted Data Without Data Owner Participation: Introducing the Encrypted Distance Matrix
    Almutairi, Nawal
    Coenen, Frans
    Dures, Keith
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY (DAWAK 2018), 2018, 11031 : 163 - 173
  • [5] R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity
    Guo, Cheng
    Jiang, Xueru
    Choo, Kim-Kwang Raymond
    Jie, Yingmo
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 162
  • [6] THIRD-PARTY EVALUATION
    ETRIS, SF
    MATERIALS RESEARCH AND STANDARDS, 1972, 12 (11): : 7 - +
  • [7] Third-party payers
    不详
    JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2005, 136 (10): : 1378 - 1378
  • [8] Third-Party Certification
    Goergen, Michael T., Jr.
    JOURNAL OF FORESTRY, 2009, 107 (05) : 232 - 232
  • [9] THIRD-PARTY PAYMENTS
    SEVY, TD
    SOCIAL WORK, 1974, 19 (01) : 125 - &
  • [10] THIRD-PARTY ROUNDS
    STOREY, PB
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1974, 228 (04): : 462 - 462