DOI QR코드

DOI QR Code

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu (Dept of CSE, Vignan Institute of Technology and Science) ;
  • A. Govardhan (Dept. of CSE, JNTUH) ;
  • Karnam Madhavi (Dept of CSE,GRIET)
  • Received : 2024.01.05
  • Published : 2024.01.30

Abstract

Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

Keywords

References

  1. Ronald L. Rivest Len Adleman, Michael L. Dertouzos "On Data Banks And Privacy Homomorphisms" Massachusetts Institute of Technology Cambridge, Massachusetts Copyright © 1978 by Academic Press, Inc 
  2. George I. Davida, David L. Wells, "A Database Encryption System with Sub-keys", ACM Transactions on Database Systems, Vol. 6, No. 2, June 1981, Pages 312-328.  https://doi.org/10.1145/319566.319580
  3. Hakan Hacigum, Bala Iyer, Chen Li, Sharad Mehrotra "Executing SQL over Encrypted Data in the Database-Service-Provider Model", ACM SIGMOD '2002 June 4-6, Madison, Wisconsin, USA Copyright 2002 ACM 1-58113-497-5/02/06 ...}. 
  4. Elisa Bertino, and Ravi Sandhu, "Database Security-Concepts, Approaches, and Challenges", IEEE Transactions On Dependable And Secure Computing, VOL. 2, NO. 1, January-March 2005 
  5. Evdokimov, S. Fischmann, M. Gunther, "Provable Security for Outsourcing Database Operations", Proceedings of the 22nd International Conference on Data Engineering (ICDE'06) 8-7695-2570-9/06 $20.00 © 2006 IEEE 
  6. Sergei Evdokimov, Oliver Gunther, "Encryption Techniques for Secure Database Outsourcing", ESORICS 2007. LNCS, vol. 4734, Springer, Heidelberg (2007) (http://www.springerlink.com/content/978-3-540-74834-2/) 
  7. Dongxi Liu, Shenlu Wang, "Programmable Order-Preserving Secure Index for Encrypted Database Query", IEEE Fifth International Conference on Cloud Computing, 978-0-7695-4755-8/12 $26.00 © 2012
  8. Dongxi Liu, Shenlu Wang, "DEMO: Query Encrypted Databases Practically", CCS'12 October 16-18, 2012, Raleigh, North Carolina, USA. ACM 978-1-4503-1651-4/12/10. 
  9. Lei Xu, Xiaoxin Wu, Hub: HeterogeneoXs Bucketization for Database Outsourcing, Cloud Computing'13, May 8, 2013, Hangzhou, China. ACM 2013 978-1-4503-2067-2/13/05 ...$15.0 ...$15.0 
  10. Luca Ferretti, Michele Colajanni, and Mirco Marchett, "Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases", IEEE Transactions on Parallel and Distributed Systems, VOL. 25, NO. 2, FEB 2014. 
  11. Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian, and Jinguang Han, Member, IEEE, Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing, IEEE Transactions On Services Computing, VOL. 10, NO. 5, SEPTEMBER/OCTOBER 2017
  12. Cheng Guo, Ruhan Zhuang, Yingmo Jie, Yizhi Ren, Ting Wu3, Kim-Kwang and Raymond Choo, "Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds" J Med Syst(2016) 40:235 DOI 10.1007/s10916-016-0588-0 
  13. Md Abdullatif ALzain and Eric Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-a-Service", Proceedings of the 44th Hawaii International Conference on System Sciences - 2011, 1530-1605/11 $26.00 © 2011 IEEE, Pg. No: 1-9 
  14. Amjad Alsirhani, Srinivas Sampalli, Peter Bodorik, "Improving Database Security in Cloud Computing by Fragmentation of Data", International Conference on Computer and Applications (ICCA), 978-1-5386-2752-5/17/$31.00
  15. Youssef Gahia * and Imane El Alaoui, "A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy", International Workshop on Emerging Networks and Communications (IWENC 2019) November 4-7, 2019, Coimbra, Portugal, Science Direct Available online at www.sciencedirect.com Procedia Computer Science 160 (2019) 811-818 
  16. K. Madhavi, G. Ramesh, K. Sowmya, CICIT, pp 630-636 (2019). 
  17. Srinu Banothu, A.Govardhan, Karnam Madhavi, Performance Comparison of Cryptographic Algorithms for Data Security in Cloud Computing, Journal of Information and Computational Science, ISSN: 1548-7741, Volume 11 Issue 9 - 2021,Pg.No 1-8. 
  18. Srinu Banothu, A.Govardhan, Karnam Madhavi, Performance Evaluation of Cloud Database Security Algorithms, E3S Web of Conferences 309 in ICMED 2021. 
  19. Bih-Hwang Lee,Ervin Kusuma Dewi, Muhammad Farid Wajdi,Data Security in Cloud Computing Using AES Under HEROKU Cloud,The 27th Wireless and Optical Communications Conference (WOCC2018). 
  20. Mr. Manish M Poteya, Dr C A Dhoteb, Mr Deepak H Sharmac,Homomorphic Encryption for Security of Cloud Data,7th International Conference on Communication, Computing and Virtualization 2016. 
  21. S.Rajeswari,R.Kalaiselvi, Survey of Data and Storage Security in Cloud Computing,Proceedings of 2017 IEEE international conference on circuits and systems(ICCS2017). 
  22. Nishit Mishra, Tarun Kumar Sharma, Varun Sharma and Vrince Vima,Secure Framework for Data Security in Cloud Computing,©Springer Nature Singapore Pte Ltd. 2018. 
  23. Krishna Keerthi Ch,Lakshmi Muddan,Rajani Kanth A,Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud,2017 2nd IEEE International Conference On Recent Trends in Electronics Information & Communication Technology (RTEICT), May 19-20, 2017. 
  24. P.Y.A.Ryan,Preta Voter with Paillier encryption, Mathematical and computer modelling,Elsevier pg.No 1646-16662,2008 
  25. Mbarek Marwan, Ali Kartit and Hassan Ouahmane,Applying Homomorphic Encryption For Securing Cloud Database,978-1-5090-0751-6/16/$31.00 ©2016 IEEE 
  26. Radjab Harerimana,Syh-Yuan Tan and Wei-Chuen Yau, A JAVA IMPLEMENTATION OF PAILLIER HOMOMORPHIC ENCRYPTION SCHEME 2017 Fifth International Conference on Information and Communication Technology (ICoICT). ISBN: 978-1-5090-4911-0 (c) 2017 IEEE 
  27. Si Chen, Lin Li, Wenyu Zhang, Xiaolin Chang, Zhen Han,BOPE: Boundary order-preserving encryption scheme in relational database system,IEEE Open Access Journal 2017. 
  28. Rivest R.L. (1993) Cryptography and machine learning. In: Imai H., Rivest R.L., Matsumoto T. (eds) Advances in Cryptology - ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_36