CryptDBaaS Query Over Encrypted DBaaS Without Third-Party

被引:0
|
作者
Draidi, Fadi [1 ]
Hmedat, Mohammad [1 ]
Abwe, Barakat [1 ]
Atrash, Amr [1 ]
机构
[1] An Najah Natl Univ, IT Fac, Nablus, Palestine
来源
ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS | 2018年
关键词
Cloud; DBaaS; DBaaS security; Cloud security; Encrypted database; Database security;
D O I
10.1145/3231053.3231068
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information storage systems usually take great care for protecting their sensitive or confidential data, even users personal data. Hence the need to implement the concept of information security as part of the system. Information security primary focus is the balanced protection of the confidentiality, integrity and availability of stored data (CIA). Cloud system is one of the platforms that provides a database as a service (DBaaS), typically it takes care of scalability and high availability of the database. The confidentiality and integrity of stored data is still not guaranteed by some cloud systems because there is no trust between data owners and third-party platforms (Cloud systems). CryptDBaaS is a security model integrating cloud computing with cryptography to provide a security mechanism for data owners, which aims to guarantee the confidentiality of stored data in the cloud from unauthorized access or misuse of data from third party. CryptDBaaS model illustrates how to encrypt your data before storing it using secure and suitable encryption algorithms based on data type and allows to execute queries and performs some mathematical and logical operations over encrypted database. CryptDBaaS is evaluated by conducting a simulation to measure performance and accuracy of queries and search techniques CryptDBaaS provides. Evaluation step shows that CryptDBaaS has a high performance with respect to the encryption and search algorithms. The queries are executed as if they were executed over plain text data, so the obtained accuracy is 100% for all queries and operators except the search one which has 50% or 100% of accuracy based on chosen technique.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Third-party client rights
    不详
    VETERINARY ECONOMICS, 2001, 42 (03): : 16 - 16
  • [42] Third-party carrier assessment
    Corkhill, M
    CHEMICAL WEEK, 1996, : T30 - T30
  • [43] No third-party punishment in chimpanzees
    Riedl, Katrin
    Jensen, Keith
    Call, Josep
    Tomasello, Michael
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2012, 109 (37) : 14824 - 14829
  • [44] THIRD-PARTY SETTLEMENTS IN EDUCATION
    BAIN, T
    ARBITRATION JOURNAL, 1971, 26 (01): : 41 - 44
  • [45] A Third-Party Facilitator of Bipartisanship
    Zinsmaier, Alexander K.
    Dong, Yan
    BIOLOGICAL PSYCHIATRY, 2021, 89 (10) : 940 - 941
  • [46] Consent and Third-Party Coercion*
    Gerver, Mollie
    ETHICS, 2021, 131 (02) : 246 - 269
  • [47] War and Third-party Trade
    Feldman, Nizan
    Sadeh, Tal
    JOURNAL OF CONFLICT RESOLUTION, 2018, 62 (01) : 119 - 142
  • [48] Third-party flow control
    Bansal, D
    Ward, PAS
    PROCEEDINGS OF THE 3RD ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2005, : 118 - 124
  • [49] The Third-Party Notification Dilemma
    Adams, Ann K.
    HASTINGS CENTER REPORT, 2014, 44 : S31 - S32
  • [50] Conflict and third-party intervention
    Siqueira, K
    DEFENCE AND PEACE ECONOMICS, 2003, 14 (06) : 389 - 400