Encrypting Databases in the Cloud: Challenges and Solutions
نویسنده
چکیده
With the growing importance of cloud computing, database encryption has become a critical technology to protect data against honest-but-curious attackers. Our goal is to encrypt the data in such a way that it remains protected against powerful attackers and at the same time achieve good performance by processing queries in the cloud without decrypting the data. Order-Preserving Encryption (OPE) is one of the most attractive techniques for database encryption since it allows the execution of range and rank queries on encrypted data. On the other hand, people are reluctant to use OPE-based techniques in practice because of their vulnerability against attackers with knowledge of the domain and its frequency distribution. This dissertation makes three important contributions. First, it formalizes a set of real-world attacker scenarios on encrypted databases, namely domain attack, frequency attack and query log attack. Query log attack refers to the inference of secrets by observing the (encrypted) queries submitted to the encrypted database. To this end, a number of encryption techniques have been developed and studied in literature. Unfortunately, most of these schemes have ignored an important threat called query log attack. Second, based on this formalization, it shows how these attacks impact the security of an important class of encryption techniques, namely OPE. Third, it explores new encryption techniques called Probabilistic Order-Preserving Encryption (Prob-OPE) and Randomly Partitioned Encryption (RPE) which are proven to be resilient against the attacker scenarios mentioned previously. These encryption techniques address the need to encrypt databases in the cloud and at the same time execute complex SQL queries efficiently. Prob-OPE and RPE can be configured to meet different privacy and performance requirements. Privacy and performance experiments conducted using the TPC-H queries show that Prob-OPE and RPE make it indeed possible to achieve a higher level of privacy compared to the state of the art with low performance overheads.
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملCloud computing security using encryption technique
Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. The Cloud computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are stil...
متن کاملIMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing offers. The limitations faced by (SMEs) in procuring and maintaining IT infrastructures has be...
متن کاملA Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کامل