CFP last date
20 December 2024
Reseach Article

DD-PLAC: Preserving Privacy with Encrypted Cloud Database

by Shital H. Dinde, Arati M. Dixit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 9
Year of Publication: 2015
Authors: Shital H. Dinde, Arati M. Dixit
10.5120/ijca2015905505

Shital H. Dinde, Arati M. Dixit . DD-PLAC: Preserving Privacy with Encrypted Cloud Database. International Journal of Computer Applications. 124, 9 ( August 2015), 46-51. DOI=10.5120/ijca2015905505

@article{ 10.5120/ijca2015905505,
author = { Shital H. Dinde, Arati M. Dixit },
title = { DD-PLAC: Preserving Privacy with Encrypted Cloud Database },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 9 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 46-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number9/22135-2015905505/ },
doi = { 10.5120/ijca2015905505 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:58.712083+05:30
%A Shital H. Dinde
%A Arati M. Dixit
%T DD-PLAC: Preserving Privacy with Encrypted Cloud Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 9
%P 46-51
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud database services assure the high availability and scalability, but there are many issues about data privacy and confidentiality. The online applications are also vulnerable to attack that gain access to the sensitive data as the attacker can easily exploit software bug. Hence the security and privacy of the sensitive data stored on the cloud is the biggest challenge today. Storing critical and sensitive data in the hands of cloud service provider will not guarantee the privacy of data. Several ways are available for storage services , but the data privacy and confidentiality solutions for cloud database are still in research. The data privacy and confidentiality can be maintained by combining encryption of data with SQL operations. The application that uses SQL database can be secured by using DD-PLAC architecture which provides confidentiality of the data stored on cloud. DD-PLAC (Distributed Database with Proxy-less architectures that store meta data in the cloud) architecture combines data encryption, key management and access control policies which addresses the issues related to typical threat for cloud database.

References
  1. Daniel J. Abadi, Data Management in the Cloud: Limitations and Opportunities, IEEE Data Engineering Bulletin, Volume 32, March 2009, 3-12.
  2. James Broberg, Rajkumar Buyya, Zahir Tari, MetaCDN: Harnessing Storage Clouds or high performance content delivery, Journal of Network and Computer Applications, 1012–1022, 2009.
  3. Oracle corporation: Oracle advanced security (October 2012), http://www.oracle.com/technetwork/database/options/advanced-security
  4. Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Metadata Management in Outsourced Encrypted Databases. In: Jonker, W., Petkovi´c, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 16–32. Springer, Heidelberg (2005)
  5. Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty- Third ACM Symposium on Operating Systems Principles, SOSP 2011, pp. 85–100. ACM, New York (2011)
  6. Luca Ferretti, Michele Colajanni, and Mirco Marchetti: Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases. IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 2, February 2014
  7. “Xeround: The Cloud Database,” Xeround, http://xeround.com, Apr. 2013.
  8. B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M.Newbold, M. Hibler, C. Barb, and A. Joglekar, “An Integrated Experimental Environment for Distributed Systems and Networks,” Proc. Fifth USENIX Conf. Operating Systems Design and Implementation, Dec. 2002.
  9. Tim Mather, Subra Kumaraswamy, and Shahed Latif ”Cloud Security and Privacy” Published by O’Reilly Media, Inc.
  10. Carlo Curion, Evan P.C.Jones, Hari Balkrishna, Nirmesh Malviya, "Relational Cloud: A Database as a Service for the Cloud"
  11. ”Addressing Data Security Challenges in the Cloud” A Trend Micro White Paper | July 2010
  12. tpcc-mysql: Simple usage steps and how to build graphs with gnuplot, by Michael Rikmas. https://www.percona.com/blog/2013/07/01/tpcc-mysql-simple-usage-steps-and-how-to-build-graphs-with-gnuplot/
  13. How To Measure MySQL Query Performance with mysqlslap: https://www.digitalocean.com/community/ tutorials/how-to-measure-mysql-query-performance-with-mysqlslap
  14. Manual Reference Pages - \FBMYSQLSLAP\FR (1) http://manpages.sgvulcan.com/mysqlslap.1.php
  15. M. R. Asghar, G. Russello, B. Crispo, and M. Ion, “Supporting complex queries and access policies for multi-user encrypted databases,” in Proc. ACM Workshop Cloud Comput. Secur., Nov.2013, pp. 77–88
  16. R. S. Sandhu and P. Samarati, “Access control: Principle and practice,” IEEE Commun. Mag., vol. 32, no. 9, pp. 40–48, Sep. 1994.
Index Terms

Computer Science
Information Sciences

Keywords

Security Privacy cloud database Symmetric key algorithm (SKA) access control DD-PLAC (Distributed Database with Proxy-less architectures that store meta data in the cloud)