Abstract
In this article, we introduce a practical scheme that dynamically secures and outsources data on demand as well as propose a corresponding architecture to securely process data in database service provider. We also adopt the application of bring your own device in this scheme as an enhanced security solution. After studying over 1300 database models, we expect this scheme can be applied in production with justifiable result.
Highlights
Cloud services have been widely used in recent years, they brought convenience to the enterprise and they brought new challenges: Data outsourcing becomes a headache as companies cannot guarantee the integrity and confidentiality of what they provided to the service providers
It could lead to crisis if the cloud service provider is compromised and data of users are exposed to attackers in plain text
While databases are stored at database service provider (DSP), queries are prepared at Secure meta mediator (SMM) and will be sent to DSP for execution phase. The problem of this model is that once SMM is compromised, attackers will get the information about all user data, and bottleneck could happen if SMM tries to process a large amount of queries at the same time before sending them to DSP
Summary
Cloud services have been widely used in recent years, they brought convenience to the enterprise and they brought new challenges: Data outsourcing becomes a headache as companies cannot guarantee the integrity and confidentiality of what they provided to the service providers. Data could be modified accidentally or maliciously or could be leaked to the adversaries (attackers, malicious providers).[1,2,3] The demand of storing and processing data online grows quickly to adapt to the rapid change of business. Researchers have been working on a variety of techniques in order to limit the impact caused by data leak. Ones could be mentioned are access control, encryption or even extra layer of authentication and authorization leveraged by OAuth2.4 The first step is always about securely encrypting data before storing them on the cloud. Homomorphic encryption allows arbitrary computations on fully encrypted data, but this technique is limited to certain algebraic calculations, and the low performance makes it especially impractical to be applied in production.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Distributed Sensor Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.