Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Accessing Encrypted Cloud Databases: A Novel Architecture for Secure and Concurrent DBaaS, Assignments of Computer Science

This document proposes a novel architecture for distributed, concurrent, and independent access to encrypted cloud databases. The architecture integrates cloud database services with data confidentiality and enables geographically distributed clients to connect directly to an encrypted cloud database, executing concurrent and independent operations. The proposed solution eliminates intermediate proxies and guarantees data confidentiality through encryption, providing the same availability, elasticity, and scalability as the original cloud DBaaS.

What you will learn

  • What are the advantages of the proposed architecture compared to existing solutions?
  • How does the proposed architecture support concurrent SQL operations on encrypted tenant data?
  • How does the proposed architecture ensure data confidentiality in the cloud database as a service (DBaaS) paradigm?

Typology: Assignments

2020/2021

Uploaded on 04/05/2021

Nandhaku2
Nandhaku2 🇮🇳

3 documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases
ABSTRACT:
Placing critical data in the hands of a cloud provider should come with the
guarantee of security and availability for data at rest, in motion, and in use. Several
alternatives exist for storage services, while data confidentiality solutions for the
database as a service paradigm are still immature. We propose a novel architecture
that integrates cloud database services with data confidentiality and the possibility
of executing concurrent operations on encrypted data. This is th first solution
supporting geographically distributed clients to connect directly to an encrypted
cloud database, and to execute concurrent and independent operations including
those modifying the database structure. The proposed architecture has the further
advantage of eliminating intermediate proxies that limit the elasticity, availability,
and scalability properties that are intrinsic in cloud-based solutions. The efficacy of
the proposed architecture is evaluated through theoretical analyses and extensive
experimental results based on a prototype implementation subject to the TPC-C
standard benchmark for different numbers of clients and network latencies.
EXISTING SYSTEM:
Original plain data must be accessible only by trusted parties that do not
include cloud providers, intermediaries, and Internet; in any untrusted context, data
must be encrypted. Satisfying these goals has different levels of complexity
depending on the type of cloud service. There are several solutions ensuring
pf3
pf4
pf5
pf8

Partial preview of the text

Download Accessing Encrypted Cloud Databases: A Novel Architecture for Secure and Concurrent DBaaS and more Assignments Computer Science in PDF only on Docsity!

Distributed, Concurrent, and Independent Access to

Encrypted Cloud Databases

ABSTRACT:

Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is th first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.

EXISTING SYSTEM:

 Original plain data must be accessible only by trusted parties that do not include cloud providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. Satisfying these goals has different levels of complexity depending on the type of cloud service. There are several solutions ensuring

confidentiality for the storage as a service paradigm, while guaranteeing confidentiality in the database as a service (DBaaS) paradigm is still an open research area. DISADVANTAGES OF EXISTING SYSTEM:  Cannot apply fully homomorphic encryption schemes because of their excessive computational complexity.

PROPOSED SYSTEM:

 We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data.  This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure.  The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions.  Secure DBaaS provides several original features that differentiate it from previous work in the field of security for remote database services.

SYSTEM ARCHITECTURE:

MODULES:

  1. Setup Phase
  2. Meta Data Module
  3. Sequential SQL Operations
  4. Concurrent SQL Operations

MODULES DESCRIPTION:

Setup Phase:  We describe how to initialize a Secure DBaaS architecture from a cloud database service acquired by a tenant from a cloud provider.  We assume that the DBA creates the metadata storage table that at the beginning contains just the database metadata, and not the table metadata.

 The DBA populates the database metadata through the Secure DBaaS client by using randomly generated encryption keys for any combinations of data types and encryption types, and stores them in the metadata storage table after encryption through the master key.  Then, the DBA distributes the master key to the legitimate users. User access control policies are administrated by the DBA through some standard data control language as in any unencrypted database. In the following steps, the DBA creates the tables of the encrypted database. Meta Data Module:  In this module, we develop Meta data. So our system does not require a trusted broker or a trusted proxy because tenant data and metadata stored by the cloud database are always encrypted.  In this module, we design such as Tenant data, data structures, and metadata must be encrypted before exiting from the client.  The information managed by SecureDBaaS includes plaintext data, encrypted data, metadata, and encrypted metadata. Plaintext data consist of information that a tenant wants to store and process remotely in the cloud DBaaS.  SecureDBaaS clients produce also a set of metadata consisting of information required to encrypt and decrypt data as well as other administration information. Even metadata are encrypted and stored in the cloud DBaaS. Sequential SQL Operations:  The first connection of the client with the cloud DBaaS is for authentication purposes. Secure DBaaS relies on standard authentication and authorization

 Our architecture must guarantee consistency among encrypted tenant data and encrypted metadata because corrupted or out-of-date metadata would prevent clients from decoding encrypted tenant data resulting in permanent data losses.  A thorough analysis of the possible issues and solutions related to concurrent SQL operations on encrypted tenant data. Here, we remark the importance of distinguishing two classes of statements that are supported by Secure DBaaS: SQL operations not causing modifications to the database structure, such as read, write, and update; operations involving alterations of the database structure through creation, removal, and modification of database tables (data definition layer operators).

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

 System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net

 Tool : Visual Studio 2010  Database : SQL SERVER 2008

REFERENCE:

Luca Ferretti, Michele Colajanni, and Mirco Marchetti, “ Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases ”, VOL. 25, NO. 2, FEBRUARY 2014.