Secure Model based on Multi-cloud for Big Data Storage and Query

被引:0
作者
Yang, Zhendong [1 ]
Wang, Liangmin [1 ]
Song, Xiangmei [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Peoples R China
来源
2016 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2016) | 2016年
关键词
database security; multi-cloud; secret sharing; vendor lock-in; cloud availability;
D O I
10.1109/CBD.2016.36
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Database-as-a-Service provides a scalable cloud database for data owners. However, existing cloud database has its limitations. Intermittent unavailability of cloud service increases the response time for the database. In addition, vendor lock-in makes it difficult for data owners to change the service provider when necessary. In this paper, we propose a secure model based on multi-cloud, adopting secret sharing algorithm to upload the encrypted data to clouds and supporting SQL queries on encrypted data. In our model, most computations are performed in the clouds in order to increase query efficiency. We implemented this model as a client application which is proven to be practical. We observed that our model can improve the availability of cloud database and ensure the data security in multi-cloud. Moreover, this model reduces the query processing time compared to other encrypted cloud database without increasing the cost of cloud service.
引用
收藏
页码:207 / 214
页数:8
相关论文
共 20 条
[1]  
Aggarwal G., 2005, CIDR 2005
[2]  
AlZain M. A., 2011, Proceedings of the 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), P784, DOI 10.1109/DASC.2011.133
[3]  
ALzain M A., 2011, The 44th Hawaii International Conference on System Sciences, P1, DOI DOI 10.1109/HICSS.2011.478
[4]  
[Anonymous], 2010, Proceedings of the 1st ACM symposium on Cloud computing
[5]   DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds [J].
Bessani, Alysson ;
Correia, Miguel ;
Quaresma, Bruno ;
Andre, Fernando ;
Sousa, Paulo .
ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)
[6]  
Castano S., 1995, ACM PRESS BOOKS WOKI, V1
[7]   NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds [J].
Chen, Henry C. H. ;
Hu, Yuchong ;
Lee, Patrick P. C. ;
Tang, Yang .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (01) :31-44
[8]   Dividing secrets to secure data outsourcing [J].
Emekci, Fatih ;
Methwally, Ahmed ;
Agrawal, Divyakant ;
El Abbadi, Amr .
INFORMATION SCIENCES, 2014, 263 :198-210
[9]  
Feldman A.J., 2010, S OPERATING SYSTEM D, P337
[10]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178