skip to main content
10.1145/3290511.3290580acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicetcConference Proceedingsconference-collections
research-article

Privacy and availability in cloud data warehouse

Published:26 October 2018Publication History

ABSTRACT

With the rise of cloud computing, data warehouse can benefit from this new technology in term of cost reduction, computing power and response time. However, as each technological advance, the cloud computing also brings its own risks, particularly in terms of security that must be taken into account to enjoy all the benefits of this solution. For that, in this paper, we propose a new secure scheme for outsourced data warehouse in the cloud. This new scheme is based on the (n, k) Shamir secret sharing schemas, information dispersal algorithm IDA and multivalued order preserving encryption MV-OPE. The proposed scheme guarantees data availability, confidentiality and enables analyzing data in the cloud without post processing in the client.

References

  1. Amazon "Amazon simple storage service (Amazon S3)". Available: http://aws.amazon.com/s3 2008.Google ScholarGoogle Scholar
  2. S. Ghemawat, H. Gobioff, and S. Leung, " The Google file system," in ACM Symposium on Operating Systems Principles pp. 29 -- 43, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Borthakur." The Hadoop distributed file system: Architecture and design" 2007.Google ScholarGoogle Scholar
  4. H. Veathespoon and J. D. Kubiatowiez " Erasure coding vs replication : a quantitative comparaison". Computer science division, University of California, Berkeley.Google ScholarGoogle Scholar
  5. K. V. Rashi, Niha. B. Shah, D. Gu, H. Kuang, D. Borthakur, K. Rach ondran "A solution to the network challenges of data recovery in erasure-coded distribute storage systems: A study on the Facebook warehouse cluster". Networking and internet architecture, computer science 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C.Huang,H.Simitci,Y.Xu,A.Ogus,B.Calder,P.Gopalan,J.Li and S.Yekhanin "Erasure coding in windows Azure storage ".Conference on annual Technical Conference ages 2--2, 2012 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H.Xu and D.Bhalerao "A reliable and secure cloud storage schema using multiple service providers".The 27th international conference on software engineering and knowledge engineering 2015.Google ScholarGoogle Scholar
  8. H.Kadhen, T.Amagasa and H.Kitagawa "A novel framework for database security based on mixed cryptography". ICIW ,Venise Italy 163--170 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R.A.Popa,C.M.S.Redfield,N.Zeldovich,H.Balakrishnan"Cryp tDB :Processing queries on an encrypted database ".ACM 103--111 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B.Schneier"Description of a new variable-length key,64-bit block cipher (blowfish)".Fast software encryption ,Cambridge security workshop, London,UK page 191--204 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D.Liu "Securing outsourced databases in the cloud" .In security, privacy and trust in cloud systems, Springer,Heidelberg age 259--282 2014.Google ScholarGoogle Scholar
  12. P.Wang and C.V.Ravishankar "Secure and efficient range queries on outsourced databases using Rp-Trees". 29th IEEE international conference on data engineering, Brisbane, Australia, april 8--11, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R.Agrawal,J.Kiernan,R.Srikant and Y.Xu"Order preserving encryption for numeric data".Sigmod 2004 june 13--18 2004 aris france. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B.Hore,S.Mehrotra,M.Canim and M.Kantarcioglu "Secure multidimensional range queries over outsourced data. The VLDB Journal page 333--358 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H.Kathen,T.Amagasa and H.Kitagawa "MV-OPES : Multivalued-order preserving encryption schemes :A novel scheme for encrypting integer value to many different values ". IEIC Trans 2010.Google ScholarGoogle Scholar
  16. A.Shamir "How to share a secret ". ACM 1979 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M.O.Rabin "Efficient dispersal of information for security load balancing, and fault tolerance".Published by ACM 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A.Bessami,M.Correia,B.Quaresma,F.André, and P.Sousa ,"DepSky :dependable and secure storage in the cloud -of-clouds".In processings of the sixth conference on coputer systems. ACM, 2011, 31--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C.Caclin,R.Haas,and M.Vukolic ,"Dependable storage in the intercloud ".IBM rechearch, vol.3783, 1--6 2010.Google ScholarGoogle Scholar
  20. F.Alsolami and C.E.Chow,"N-cloud : improving performance and security in cloud storage"in high performance switching and routing (HPSR),2013 IEEE .Google ScholarGoogle Scholar
  21. F.Alsolai and T.Boult," CloudStash :using secret sharing scheme to secure data, not keys, in multi-clouds". 11th international conference on information technology : new generations 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A.Varunya,N.Harbi,J.Darmont "A novel multi secret sharing approach for secure data warehousing and On-Line analysis processing in the cloud".IGI 2015.Google ScholarGoogle Scholar
  23. C.Cruz loes,V.Cesario times, S.Matwin,R.Rodrigues Cifferi,and C.Dutrade Aguiar Ciferri "Processing OLAP queries over encrypted data warehouse stored in the cloud.Dawaj 2014, LNCS 8646,. 195--207, 2014Google ScholarGoogle Scholar

Index Terms

  1. Privacy and availability in cloud data warehouse

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICETC '18: Proceedings of the 10th International Conference on Education Technology and Computers
      October 2018
      391 pages
      ISBN:9781450365178
      DOI:10.1145/3290511

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader