Novel data storage and retrieval in cloud database by using frequent access node encryption

Sadia Syed, P. Teja
{"title":"Novel data storage and retrieval in cloud database by using frequent access node encryption","authors":"Sadia Syed, P. Teja","doi":"10.1109/IC3I.2014.7019733","DOIUrl":null,"url":null,"abstract":"Cloud computing has the advantage that it offers companies unlimited data storage at attractive costs. However, it also introduces new challenges for protecting the confidentiality of the data, and the access to the data. Sensitive data like medical records, business or governmental data cannot be stored unencrypted on the cloud. Moreover, they can be of interest to many users and different policies could apply to each. Companies need new mechanisms to query the encrypted data without revealing anything to the cloud server, and to enforce access policies to the data. Current security schemes do not allow complex encrypted queries over encrypted data in a multi-user setting. Instead, they are limited to keyword searches. Moreover, current solutions assume that all users have the same access rights to the data. This paper shows the implementation of a scheme that allows making SQL-like queries on encrypted databases in a multi-user setting, while at the same time allowing the database owner to assign different access rights to users.we address these issues by combining cloud computing technologies and Attribute Based Encryption for Secure storage and efficient retrieval of Data from the Databases. Here the Attribute is the Frequent access Node in the database which can be Encrypted for Secure Storage and Retrieval. Using database encryption to protect data in some situations where access control is not solely enough is inevitable. Database encryption provides an additional layer of protection to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data keeps protected even in the incident that database is successfully attacked or stolen. However, data encryption and decryption process result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and the performance is normally forced. We present our approach for a multi-level threshold attribute based encryption scheme whose cipher text size depends only on the size of the policy and is independent of the number of attributes. The attribute can be taken as the Very frequent Accessing Node in the Database.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I.2014.7019733","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Cloud computing has the advantage that it offers companies unlimited data storage at attractive costs. However, it also introduces new challenges for protecting the confidentiality of the data, and the access to the data. Sensitive data like medical records, business or governmental data cannot be stored unencrypted on the cloud. Moreover, they can be of interest to many users and different policies could apply to each. Companies need new mechanisms to query the encrypted data without revealing anything to the cloud server, and to enforce access policies to the data. Current security schemes do not allow complex encrypted queries over encrypted data in a multi-user setting. Instead, they are limited to keyword searches. Moreover, current solutions assume that all users have the same access rights to the data. This paper shows the implementation of a scheme that allows making SQL-like queries on encrypted databases in a multi-user setting, while at the same time allowing the database owner to assign different access rights to users.we address these issues by combining cloud computing technologies and Attribute Based Encryption for Secure storage and efficient retrieval of Data from the Databases. Here the Attribute is the Frequent access Node in the database which can be Encrypted for Secure Storage and Retrieval. Using database encryption to protect data in some situations where access control is not solely enough is inevitable. Database encryption provides an additional layer of protection to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data keeps protected even in the incident that database is successfully attacked or stolen. However, data encryption and decryption process result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and the performance is normally forced. We present our approach for a multi-level threshold attribute based encryption scheme whose cipher text size depends only on the size of the policy and is independent of the number of attributes. The attribute can be taken as the Very frequent Accessing Node in the Database.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于频繁访问节点加密的云数据库数据存储与检索
云计算的优势在于它以诱人的成本为企业提供无限的数据存储。然而,它也为保护数据的机密性和访问数据带来了新的挑战。医疗记录、商业或政府数据等敏感数据不能不加密地存储在云上。此外,它们可能是许多用户感兴趣的,每个用户可以应用不同的策略。公司需要新的机制来查询加密的数据而不向云服务器泄露任何信息,并对数据实施访问策略。当前的安全方案不允许在多用户设置中对加密数据进行复杂的加密查询。相反,它们仅限于关键字搜索。此外,当前的解决方案假设所有用户对数据具有相同的访问权限。本文展示了一个方案的实现,该方案允许在多用户设置下对加密数据库进行类似sql的查询,同时允许数据库所有者为用户分配不同的访问权限。我们通过结合云计算技术和基于属性的加密技术来解决这些问题,以便从数据库中安全存储和有效检索数据。这里的属性是数据库中的频繁访问节点,可以对其进行加密,以便安全存储和检索。在一些访问控制不够的情况下,使用数据库加密来保护数据是不可避免的。数据库加密为传统的访问控制技术提供了额外的保护层。它可以防止未经授权的用户,包括闯入网络的入侵者,查看敏感数据。因此,即使在数据库被成功攻击或被盗的情况下,数据也能得到保护。但是,数据加解密过程会导致数据库性能下降。在所有信息都以加密形式存储的情况下,不能再对数据库内容进行选择。数据应该首先解密,因此通常被迫在安全性和性能之间进行不情愿的权衡。我们提出了一种基于多级阈值属性的加密方案,该方案的密文大小仅取决于策略的大小,而与属性的数量无关。该属性可以看作是数据库中非常频繁的访问节点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Smart home and smart city solutions enabled by 5G, IoT, AAI and CoT services Video retrieval: An accurate approach based on Kirsch descriptor Microarray data classification using Fuzzy K-Nearest Neighbor Assessment of data quality in Web sites: towards a model A novel cross layer wireless mesh network protocol for distributed generation in electrical networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1