CFP last date
20 December 2024
Reseach Article

Balancing Query Performance and Security on Relational Cloud Database: An Architecture

by A.a. Obiniyi, Rosemary M. Dzer, S.e. Abdullahi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 15
Year of Publication: 2015
Authors: A.a. Obiniyi, Rosemary M. Dzer, S.e. Abdullahi
10.5120/20825-3473

A.a. Obiniyi, Rosemary M. Dzer, S.e. Abdullahi . Balancing Query Performance and Security on Relational Cloud Database: An Architecture. International Journal of Computer Applications. 118, 15 ( May 2015), 34-39. DOI=10.5120/20825-3473

@article{ 10.5120/20825-3473,
author = { A.a. Obiniyi, Rosemary M. Dzer, S.e. Abdullahi },
title = { Balancing Query Performance and Security on Relational Cloud Database: An Architecture },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 15 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number15/20825-3473/ },
doi = { 10.5120/20825-3473 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:44.321399+05:30
%A A.a. Obiniyi
%A Rosemary M. Dzer
%A S.e. Abdullahi
%T Balancing Query Performance and Security on Relational Cloud Database: An Architecture
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 15
%P 34-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data outsourcing has become a trend in the information technology industry because it offers scalability to the enormous amount of digital content stored and generated on a daily basis by individuals and corporations. Of significance, is the security and privacy of the data outsourced to cloud servers when at rest and on transit. This challenge can be addressed by encrypting data before outsourcing in other to insure its privacy from internal and external intruders. Encryption implies a sacrifice of functionality for security. Querying encrypted data is performed by decrypting the entire data before retrieval. This leads to performance degradation. While several architectures, techniques and tools have been proffered to ensure that security and performance are balanced and optimized, each of these approaches has its limitations. We propose a novel framework based on the hash map principle, that enhances the security and performance of cloud database by reducing client SQL query response time on encrypted data without limiting the type of queries performed or compromising the security of data. Also, a performance analysis of the traditional method as compared with the proposed method is done using varying number of records.

References
  1. Akshar Kaul 2013. Query Processing in Encrypted Cloud Databases. A Master's Thesis. July 2013.
  2. Brinkman R. 2007. Ph. D Thesis. Searching in Encrypted Data.
  3. Dawn Xiaodong Song, David Wagner, Adrian Perrig (2000). Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44-55.
  4. E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati 2003. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pp. 93-102, 2003.
  5. Frakes B. William and Baeza-Yates Ricardo 1992. Information Retrieval Data Structures and Algorithms. A Book
  6. George I. Davida, David L. Wells, John B. Kam 1981. A database encryption system with subkeys. ACM Trans. Database Syst. , 6(2):312-328.
  7. Hac?gümü?, H. , Iyer, B. , and Mehrotra, S. 2004. Efficient execution of aggregation queries over encrypted relational databases 633-650. In Proc. of the 9th International Conference on Database Systems for Advanced Applications, Jeju Island, Korea, March 2004.
  8. Hac?gümü?, H. , Iyer, B. , Li Chen and Mehrotra, S. 2002b. Executing SQL over encrypted data in the database service provider model. In SIGMOD Conference, 2002.
  9. Hac?gümü?, H. , Iyer, B. , Li Chen and Mehrotra, S. , 2002a. Providing Database as a Service. In Proceedings of ICDE, 2002.
  10. What is Google Cloud SQL? https://developers. google. com/cloud-sql/docs/. Accessed on: January 21, 2015.
  11. Lafore Robert 1999. Teach yourself data structures and algorithms in 24 hours. SAMS publishing. A Book
  12. Manish Sharma, Atul Chaudhary and Santosh Kumar 2013. Query Processing and Performance and Searching over encrypted data by using an Efficient Algorithm. A Paper.
  13. Mateljan Vladimir, Cisic D. , Ogrizovic D. 2010. Cloud Database-as-a-Service(DaaS). ROI. In MIPRO, 2010 proceedings of the 33rd International convention, pages 1185-1188. IEEE
  14. Mohammed Alhanjouri and Ayman M. Al Derawi 2011. New Method of Query over Encrypted Data in Database. A Paper.
  15. Mohammed Alhanjouri and Ayman M. Al Derawi 2012. A New Method of Query over Encrypted Data in Database using Hash Map. A Paper.
  16. Montz Borgmann, Tobias Hahn, Michael Herfert, Thomas Kunz, Marcel Richter, Ursula Viebeg, Sven Vowe 2012. Sit Technical Reports: On the Security of Cloud Storage Services. Fraunhofer Institute for Secure Information Technology SIT, Germany. March 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Database Security Hash Map Query Processing Data Encryption DaaS Relational Database.