DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases

被引:4
作者
Ghazi, Yumna [1 ]
Masood, Rahat [2 ]
Rauf, Abid [1 ]
Shibli, Muhammad Awais [3 ]
Hassan, Osman [1 ]
机构
[1] NUST, SEECS, Islamabad 44000, Pakistan
[2] UNSW, Sydney, NSW, Australia
[3] VisionIT, Detriot, MI USA
来源
EURASIP JOURNAL ON INFORMATION SECURITY | 2016年
关键词
Cloud database; Document-oriented NoSQL; Security-as-a-service; eXtensible access control markup language (XACML); Database security;
D O I
10.1186/s13635-016-0040-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominent types of NoSQL databases is document-based storage, which is being increasingly used in the dynamic cloud paradigm. However, there are inherent security issues in cloud, including remote data residency along with the non-existent control of owners over their own data. In addition to that, the inherent security features of most document-based NoSQL databases lack granular access control and robust confidentiality mechanisms. There is also a distinct lack of a comprehensive solution that effectively caters to all the security requirements of a document-oriented database in cloud. In order to overcome these issues, we propose a database security-as-a-service (DB-SECaaS) system over document-oriented database hosted in cloud, which provides authentication, fine-grained authorization, and encryption of the database objects, while ensuring that access to the data is granted only to authorized users on a need-to-know basis. The paper shows that the DB-SECaaS system strongly enhances the security of documentoriented databases on cloud, and it is thus expected to facilitate the industry to reap the benefits of NoSQL without worrying over security issues. In order to certify the abovementioned security enhancements, provided by DB-SECaaS, the paper also provides a formal analysis of DB-SECaaS using the Scyther model checker. As a proof of concept, the core functionalities of the protocol, i. e., authorization, authentication, and encryption, are formally modeled in Scyther to formally verify that the proposed framework mitigates privacy and security concerns.
引用
收藏
页数:17
相关论文
共 34 条
  • [1] ALzain M, 2011, P 44 HAW INT C SYST, P1, DOI DOI 10.1109/HICSS.2011.478
  • [2] [Anonymous], SCYTHER SEMANTICS VE
  • [3] [Anonymous], 2015, FORBES
  • [4] [Anonymous], 2015, W POST
  • [5] BARKER E, 2006, NIST SPECIAL PUBLICA
  • [6] Bounded model checking
    Biere, Armin
    [J]. Frontiers in Artificial Intelligence and Applications, 2009, 185 (01) : 457 - 481
  • [7] Bracci F, 2012, COMP COMM ISCC 2012
  • [8] Cattells R, 2011, ACM SIGMOD RECORD, V39, P12, DOI [10.1145/1978915.1978919, DOI 10.1145/1978915.1978919]
  • [9] Couch DB, 2015, DEF GUID SEC
  • [10] Delettre C, 2011, COMP COMM ISCC 2011, P424