Abstract

In this article, we introduce a practical scheme that dynamically secures and outsources data on demand as well as propose a corresponding architecture to securely process data in database service provider. We also adopt the application of bring your own device in this scheme as an enhanced security solution. After studying over 1300 database models, we expect this scheme can be applied in production with justifiable result.

Highlights

  • Cloud services have been widely used in recent years, they brought convenience to the enterprise and they brought new challenges: Data outsourcing becomes a headache as companies cannot guarantee the integrity and confidentiality of what they provided to the service providers

  • It could lead to crisis if the cloud service provider is compromised and data of users are exposed to attackers in plain text

  • While databases are stored at database service provider (DSP), queries are prepared at Secure meta mediator (SMM) and will be sent to DSP for execution phase. The problem of this model is that once SMM is compromised, attackers will get the information about all user data, and bottleneck could happen if SMM tries to process a large amount of queries at the same time before sending them to DSP

Read more

Summary

Introduction

Cloud services have been widely used in recent years, they brought convenience to the enterprise and they brought new challenges: Data outsourcing becomes a headache as companies cannot guarantee the integrity and confidentiality of what they provided to the service providers. Data could be modified accidentally or maliciously or could be leaked to the adversaries (attackers, malicious providers).[1,2,3] The demand of storing and processing data online grows quickly to adapt to the rapid change of business. Researchers have been working on a variety of techniques in order to limit the impact caused by data leak. Ones could be mentioned are access control, encryption or even extra layer of authentication and authorization leveraged by OAuth2.4 The first step is always about securely encrypting data before storing them on the cloud. Homomorphic encryption allows arbitrary computations on fully encrypted data, but this technique is limited to certain algebraic calculations, and the low performance makes it especially impractical to be applied in production.

Related work
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call