CryptDBaaS Query Over Encrypted DBaaS Without Third-Party

被引:0
|
作者
Draidi, Fadi [1 ]
Hmedat, Mohammad [1 ]
Abwe, Barakat [1 ]
Atrash, Amr [1 ]
机构
[1] An Najah Natl Univ, IT Fac, Nablus, Palestine
来源
ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS | 2018年
关键词
Cloud; DBaaS; DBaaS security; Cloud security; Encrypted database; Database security;
D O I
10.1145/3231053.3231068
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information storage systems usually take great care for protecting their sensitive or confidential data, even users personal data. Hence the need to implement the concept of information security as part of the system. Information security primary focus is the balanced protection of the confidentiality, integrity and availability of stored data (CIA). Cloud system is one of the platforms that provides a database as a service (DBaaS), typically it takes care of scalability and high availability of the database. The confidentiality and integrity of stored data is still not guaranteed by some cloud systems because there is no trust between data owners and third-party platforms (Cloud systems). CryptDBaaS is a security model integrating cloud computing with cryptography to provide a security mechanism for data owners, which aims to guarantee the confidentiality of stored data in the cloud from unauthorized access or misuse of data from third party. CryptDBaaS model illustrates how to encrypt your data before storing it using secure and suitable encryption algorithms based on data type and allows to execute queries and performs some mathematical and logical operations over encrypted database. CryptDBaaS is evaluated by conducting a simulation to measure performance and accuracy of queries and search techniques CryptDBaaS provides. Evaluation step shows that CryptDBaaS has a high performance with respect to the encryption and search algorithms. The queries are executed as if they were executed over plain text data, so the obtained accuracy is 100% for all queries and operators except the search one which has 50% or 100% of accuracy based on chosen technique.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] THE THIRD-PARTY DOCTRINE AND THE THIRD PERSON
    Stern, Simon
    NEW CRIMINAL LAW REVIEW, 2013, 16 (03): : 364 - 412
  • [22] Risks of third-party data
    Schneier, B
    COMMUNICATIONS OF THE ACM, 2005, 48 (05) : 136 - 136
  • [23] Third-party verification on sustainability
    不详
    CANADIAN MINING JOURNAL, 2007, 128 (07) : 6 - 6
  • [24] THE CASE FOR THE THIRD-PARTY DOCTRINE
    Kerr, Orin S.
    MICHIGAN LAW REVIEW, 2009, 107 (04) : 561 - 601
  • [25] Third-party coalitional action
    East, M
    PARTNERSHIPS FOR PEACE, DEMOCRACY AND PROSPERITY, 1997, : 49 - 50
  • [26] Third-party intervention in secessions
    Friedhelm Hentschel
    Economics of Governance, 2022, 23 : 65 - 82
  • [27] Orienting to third-party conversations
    Martinez-Sussmann, Carmen
    Akhtar, Nameera
    Diesendruck, Gil
    Markson, Lori
    JOURNAL OF CHILD LANGUAGE, 2011, 38 (02) : 273 - 296
  • [28] MONITORING THIRD-PARTY PAYMENTS
    STUART, DM
    AMERICAN PHARMACY, 1981, 21 (02): : 5 - 5
  • [29] Third-party "closing" opinions
    Sigal, MO
    Bernstein, DS
    Bleich, DL
    Corbin, SN
    Field, AN
    Fleischman, EH
    Halliday, JW
    Holderness, AS
    Moskin, M
    Niemeth, C
    Tehan, JB
    Thoyer, JR
    Blassberg, F
    Bolger, RM
    Coviello, PE
    Holtzschue, KB
    Hyman, JE
    Lefkowitz, HN
    Monte-Sano, V
    Papernik, JI
    Rosenman, R
    Schorr, BL
    Murdoch, DA
    Attea, FG
    Bidwell, JT
    Daitz, RF
    Gersen, D
    Heath, AJ
    Hinsey, J
    Howe, RR
    Koelbl, CG
    McDermott, RT
    Nimkin, BW
    Tyler, JR
    Veron, RL
    Wetzler, ME
    Stein, JM
    Glazer, DW
    Keller, S
    Heiss, R
    Ambro, TL
    Estey, WM
    Goyne, RA
    BUSINESS LAWYER, 1998, 53 (02): : 592 - 680
  • [30] Those third-party reports
    Zabrodski, R
    CANADIAN MEDICAL ASSOCIATION JOURNAL, 1997, 156 (05) : 634 - 634