ABSTRACT
With the rise of cloud computing, data warehouse can benefit from this new technology in term of cost reduction, computing power and response time. However, as each technological advance, the cloud computing also brings its own risks, particularly in terms of security that must be taken into account to enjoy all the benefits of this solution. For that, in this paper, we propose a new secure scheme for outsourced data warehouse in the cloud. This new scheme is based on the (n, k) Shamir secret sharing schemas, information dispersal algorithm IDA and multivalued order preserving encryption MV-OPE. The proposed scheme guarantees data availability, confidentiality and enables analyzing data in the cloud without post processing in the client.
- Amazon "Amazon simple storage service (Amazon S3)". Available: http://aws.amazon.com/s3 2008.Google Scholar
- S. Ghemawat, H. Gobioff, and S. Leung, " The Google file system," in ACM Symposium on Operating Systems Principles pp. 29 -- 43, 2003. Google ScholarDigital Library
- D. Borthakur." The Hadoop distributed file system: Architecture and design" 2007.Google Scholar
- H. Veathespoon and J. D. Kubiatowiez " Erasure coding vs replication : a quantitative comparaison". Computer science division, University of California, Berkeley.Google Scholar
- K. V. Rashi, Niha. B. Shah, D. Gu, H. Kuang, D. Borthakur, K. Rach ondran "A solution to the network challenges of data recovery in erasure-coded distribute storage systems: A study on the Facebook warehouse cluster". Networking and internet architecture, computer science 2013. Google ScholarDigital Library
- C.Huang,H.Simitci,Y.Xu,A.Ogus,B.Calder,P.Gopalan,J.Li and S.Yekhanin "Erasure coding in windows Azure storage ".Conference on annual Technical Conference ages 2--2, 2012 Google ScholarDigital Library
- H.Xu and D.Bhalerao "A reliable and secure cloud storage schema using multiple service providers".The 27th international conference on software engineering and knowledge engineering 2015.Google Scholar
- H.Kadhen, T.Amagasa and H.Kitagawa "A novel framework for database security based on mixed cryptography". ICIW ,Venise Italy 163--170 2009. Google ScholarDigital Library
- R.A.Popa,C.M.S.Redfield,N.Zeldovich,H.Balakrishnan"Cryp tDB :Processing queries on an encrypted database ".ACM 103--111 2012. Google ScholarDigital Library
- B.Schneier"Description of a new variable-length key,64-bit block cipher (blowfish)".Fast software encryption ,Cambridge security workshop, London,UK page 191--204 1993. Google ScholarDigital Library
- D.Liu "Securing outsourced databases in the cloud" .In security, privacy and trust in cloud systems, Springer,Heidelberg age 259--282 2014.Google Scholar
- P.Wang and C.V.Ravishankar "Secure and efficient range queries on outsourced databases using Rp-Trees". 29th IEEE international conference on data engineering, Brisbane, Australia, april 8--11, 2013. Google ScholarDigital Library
- R.Agrawal,J.Kiernan,R.Srikant and Y.Xu"Order preserving encryption for numeric data".Sigmod 2004 june 13--18 2004 aris france. Google ScholarDigital Library
- B.Hore,S.Mehrotra,M.Canim and M.Kantarcioglu "Secure multidimensional range queries over outsourced data. The VLDB Journal page 333--358 2012. Google ScholarDigital Library
- H.Kathen,T.Amagasa and H.Kitagawa "MV-OPES : Multivalued-order preserving encryption schemes :A novel scheme for encrypting integer value to many different values ". IEIC Trans 2010.Google Scholar
- A.Shamir "How to share a secret ". ACM 1979 Google ScholarDigital Library
- M.O.Rabin "Efficient dispersal of information for security load balancing, and fault tolerance".Published by ACM 1989. Google ScholarDigital Library
- A.Bessami,M.Correia,B.Quaresma,F.André, and P.Sousa ,"DepSky :dependable and secure storage in the cloud -of-clouds".In processings of the sixth conference on coputer systems. ACM, 2011, 31--46. Google ScholarDigital Library
- C.Caclin,R.Haas,and M.Vukolic ,"Dependable storage in the intercloud ".IBM rechearch, vol.3783, 1--6 2010.Google Scholar
- F.Alsolami and C.E.Chow,"N-cloud : improving performance and security in cloud storage"in high performance switching and routing (HPSR),2013 IEEE .Google Scholar
- F.Alsolai and T.Boult," CloudStash :using secret sharing scheme to secure data, not keys, in multi-clouds". 11th international conference on information technology : new generations 2014. Google ScholarDigital Library
- A.Varunya,N.Harbi,J.Darmont "A novel multi secret sharing approach for secure data warehousing and On-Line analysis processing in the cloud".IGI 2015.Google Scholar
- C.Cruz loes,V.Cesario times, S.Matwin,R.Rodrigues Cifferi,and C.Dutrade Aguiar Ciferri "Processing OLAP queries over encrypted data warehouse stored in the cloud.Dawaj 2014, LNCS 8646,. 195--207, 2014Google Scholar
Index Terms
- Privacy and availability in cloud data warehouse
Recommendations
QoS-Oriented Monitoring Model of Cloud Computing Resources Availability
ICCIS '13: Proceedings of the 2013 International Conference on Computational and Information SciencesWith the development of cloud computing, many critical applications have been supported to provide many key services in the cloud computing. So the availability of cloud computing services turns to be higher and higher. Because resources of cloud ...
An efficient and secure data sharing framework using homomorphic encryption in the cloud
Cloud-I '12: Proceedings of the 1st International Workshop on Cloud IntelligenceDue to cost-efficiency and less hands-on management, data owners are outsourcing their data to the cloud which can provide access to the data as a service. However, by outsourcing their data to the cloud, the data owners lose control over their data as ...
Privacy Preservation of a Group and Secure Data Storage in Cloud Environment
AbstractCloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user's privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for ...
Comments