Security of database outsourcing, due to the untrustworthiness of service provider, is a basic challenge to have Database As a Service in a cloud computing environment. Having disparate assumptions to solve different aspects of security such as confidentiality and integrity is an obstacle for an integrated secure solution through the combination of existing approaches. Concentrating on confidentiality and integrity aspects of database outsourcing, this paper proposes an approach in which each attribute value is split up between several data servers using a customized threshold secret sharing scheme. Our approach preserves data confidentiality and at the same time provides the correctness verifiability of query results for clients. The distribution algorithm and redundant shares in the secret sharing scheme are the basis of correctness verification for query results.
Database as a service : towards a unified solution for security requirements / M.A. Hadavi, M. Noferesti, R. Jalili, E. Damiani - In: 36th Annual IEEE international computer software and applications conference, COMPSAC 2012 : 16-20 july 2012, Izmir, Turkey : proceedingsPiscataway : Institute of electrical and electronics engineers, 2012. - ISBN 9781467327145. - pp. 415-420 (( Intervento presentato al 36. convegno IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW) tenutosi a Izmir, Turke nel 2012 [10.1109/COMPSACW.2012.79].
Database as a service : towards a unified solution for security requirements
E. DamianiUltimo
2012
Abstract
Security of database outsourcing, due to the untrustworthiness of service provider, is a basic challenge to have Database As a Service in a cloud computing environment. Having disparate assumptions to solve different aspects of security such as confidentiality and integrity is an obstacle for an integrated secure solution through the combination of existing approaches. Concentrating on confidentiality and integrity aspects of database outsourcing, this paper proposes an approach in which each attribute value is split up between several data servers using a customized threshold secret sharing scheme. Our approach preserves data confidentiality and at the same time provides the correctness verifiability of query results for clients. The distribution algorithm and redundant shares in the secret sharing scheme are the basis of correctness verification for query results.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.