Data Confidentiality using Fragmentation in Cloud Computing

Purpose – The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security along with performance issues by encryption usage of outsourced data are the main motivation points of this research.Design/methodology/approach – This paper presents a method for secure and confidential storage of data in the cloud environment based on fragmentation. The method supports minimal encryption to minimize the computations overhead due to encryption. The proposed method uses normalization of relational databases, tables are categorized based on user requirements relating to performance, availability and serviceability, and exported to XML as fragments. After defining the fragments and assigning the appropriate confidentiality levels, the lowest number of Cloud Service Providers (CSPs) is used required to store all fragments that must remain unlinkable in separate locations.Findings – Particularly in the cloud da...

[1]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[2]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[3]  Peeyush Mathur,et al.  Cloud computing: New challenge to the entire computer industry , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[4]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[5]  Huang Bin,et al.  A novel metadata management scheme in Cloud Computing , 2010, 2010 2nd International Conference on Software Technology and Engineering.

[6]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[7]  Richard W. Scamell,et al.  Data Modeling and Database Design , 2007 .

[8]  P. Venkat Rangan,et al.  Efficient Storage Techniques for Digital Continuous Multimedia , 1993, IEEE Trans. Knowl. Data Eng..

[9]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[10]  Roel Wieringa,et al.  Risk-based Confidentiality Requirements Specification for Outsourced IT Systems , 2010, 2010 18th IEEE International Requirements Engineering Conference.

[11]  Kevin Curran,et al.  Security Issues in Cloud Computing , 2012 .

[12]  Luis Rodero-Merino,et al.  A break in the clouds: towards a cloud definition , 2008, CCRV.

[13]  Asadullah Shah,et al.  Cloud Computing Adoption Model for Universities to Increase ICT Proficiency , 2014 .

[14]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[15]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[16]  Brian Randell,et al.  A note on storage fragmentation and program segmentation , 1969, CACM.

[17]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[18]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[19]  Jan Jürjens,et al.  A framework to support alignment of secure software engineering with legal regulations , 2011, Software & Systems Modeling.

[20]  Sushil Jajodia,et al.  Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.

[21]  Albert G. Greenberg,et al.  The cost of a cloud: research problems in data center networks , 2008, CCRV.

[22]  E. Weippl,et al.  A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System , 2013 .

[23]  M. Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.

[24]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[25]  Eugene Ciurana,et al.  Google App Engine , 2009 .