Secure Model based on Multi-cloud for Big Data Storage and Query

被引:0
作者
Yang, Zhendong [1 ]
Wang, Liangmin [1 ]
Song, Xiangmei [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Peoples R China
来源
2016 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2016) | 2016年
关键词
database security; multi-cloud; secret sharing; vendor lock-in; cloud availability;
D O I
10.1109/CBD.2016.36
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Database-as-a-Service provides a scalable cloud database for data owners. However, existing cloud database has its limitations. Intermittent unavailability of cloud service increases the response time for the database. In addition, vendor lock-in makes it difficult for data owners to change the service provider when necessary. In this paper, we propose a secure model based on multi-cloud, adopting secret sharing algorithm to upload the encrypted data to clouds and supporting SQL queries on encrypted data. In our model, most computations are performed in the clouds in order to increase query efficiency. We implemented this model as a client application which is proven to be practical. We observed that our model can improve the availability of cloud database and ensure the data security in multi-cloud. Moreover, this model reduces the query processing time compared to other encrypted cloud database without increasing the cost of cloud service.
引用
收藏
页码:207 / 214
页数:8
相关论文
共 20 条
  • [1] Aggarwal G., 2005, CIDR 2005
  • [2] AlZain M. A., 2011, Proceedings of the 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), P784, DOI 10.1109/DASC.2011.133
  • [3] ALzain M A., 2011, The 44th Hawaii International Conference on System Sciences, P1, DOI DOI 10.1109/HICSS.2011.478
  • [4] [Anonymous], 2010, Proceedings of the 1st ACM symposium on Cloud computing
  • [5] DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds
    Bessani, Alysson
    Correia, Miguel
    Quaresma, Bruno
    Andre, Fernando
    Sousa, Paulo
    [J]. ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)
  • [6] Castano S., 1995, ACM PRESS BOOKS WOKI, V1
  • [7] NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
    Chen, Henry C. H.
    Hu, Yuchong
    Lee, Patrick P. C.
    Tang, Yang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (01) : 31 - 44
  • [8] Dividing secrets to secure data outsourcing
    Emekci, Fatih
    Methwally, Ahmed
    Agrawal, Divyakant
    El Abbadi, Amr
    [J]. INFORMATION SCIENCES, 2014, 263 : 198 - 210
  • [9] Feldman A.J., 2010, S OPERATING SYSTEM D, P337
  • [10] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178