Data confidentiality using fragmentation in cloud computing

被引:12
作者
Hudic, Aleksandar [1 ]
Islam, Shareeful [2 ]
Kieseberg, Peter [1 ]
Rennert, Sylvi [1 ]
Weippl, Edgar R. [1 ]
机构
[1] SBA Res gGmbH, Vienna, Austria
[2] Univ East London, Sch Architecture Comp & Engn ACE, London, England
关键词
Cloud computing; Data confidentiality; Privacy-preserving; Data fragmentation; Data outsourcing; Data management; Computing;
D O I
10.1108/17427371311315743
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose - The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security along with performance issues by encryption usage of outsourced data are the main motivation points of this research. Design/methodology/approach - This paper presents a method for secure and confidential storage of data in the cloud environment based on fragmentation. The method supports minimal encryption to minimize the computations overhead due to encryption. The proposed method uses normalization of relational databases, tables are categorized based on user requirements relating to performance, availability and serviceability, and exported to XML as fragments. After defining the fragments and assigning the appropriate confidentiality levels, the lowest number of Cloud Service Providers (CSPs) is used required to store all fragments that must remain unlinkable in separate locations. Findings - Particularly in the cloud databases are sometimes de-normalised (their normal form is decreased to lower level) to increase the performance. Originality/value - The paper proposes a methodology to minimize the need for encryption and instead focus on making data entities unlinkable so that even in the case of a security breach for one set of data, the privacy impact on the whole is limited. The paper would be relevant to those people whose main concern is to preserve data privacy in distributed systems.
引用
收藏
页码:37 / +
页数:16
相关论文
共 30 条
[1]   Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions [J].
Abdalla, Michel ;
Bellare, Mihir ;
Catalano, Dario ;
Kiltz, Eike ;
Kohno, Tadayoshi ;
Lange, Tanja ;
Malone-Lee, John ;
Neven, Gregory ;
Paillier, Pascal ;
Shi, Haixia .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :350-391
[2]  
*AM, 2006, AM EL COMP CLOUD AM
[3]  
Bin H., 2010, INT C SOFTW TECHN EN
[4]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[5]  
Chen Y., 2010, UCBEECS20105
[6]  
Chow R., 2009, PROC ACM WORKSHOP CL, P85, DOI DOI 10.1145/1655008.1655020
[7]   Combining Fragmentation and Encryption to Protect Privacy in Data Storage [J].
Ciriani, Valentina ;
Di Vimercati, Sabrina De Capitani ;
Foresti, Sara ;
Jajodia, Sushil ;
Paraboschi, Stefano ;
Samarati, Pierangela .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
[8]  
Curran K., 2011, ELIXIR NETWORK ENG, V38, P4069
[9]  
Damiani E, 2003, P 10 ACM C COMP COMM, P93
[10]  
Electronic Privacy Information Center, 1972, COD FAIR INF PRACT