Authentication Scheme for Database as a Service (DBAAS) Solutions

IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.

[1]  Hakan Hacigümüs,et al.  Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.

[2]  Michele Colajanni,et al.  Supporting Security and Consistency for Cloud Database , 2012, CSS.

[3]  Shouhuai Xu,et al.  Efficient query integrity for outsourced dynamic databases , 2012, CCSW '12.

[4]  Mojtaba Alizadeh,et al.  Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..

[5]  Eric Pardede,et al.  Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes , 2015, Int. J. Cloud Appl. Comput..

[6]  Ming-Yen Lin,et al.  Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).

[7]  Latifa Ben Arfa Rabai,et al.  A Security Framework for Secure Cloud Computing Environments , 2016, Int. J. Cloud Appl. Comput..

[8]  Ugrasen Suman,et al.  Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack , 2016, Int. J. Cloud Appl. Comput..

[9]  Ruchika Asija,et al.  Healthcare SaaS Based on a Data Model with Built-In Security and Privacy , 2016, Int. J. Cloud Appl. Comput..

[10]  Xiaodong Lin,et al.  SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[11]  Zhibin Zhou,et al.  Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[12]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[13]  Kashif Munir Authentication Model for Mobile Cloud Computing Database Service , 2017 .

[14]  Thamer Al-Rousan,et al.  Cloud Computing for Global Software Development: Opportunities and Challenges , 2015, Int. J. Cloud Appl. Comput..

[15]  Shadi R. Masadeh,et al.  A Secure Data Transmission Mechanism for Cloud Outsourced Data , 2013, Int. J. Cloud Appl. Comput..

[16]  Kashif Munir,et al.  Security model for cloud database as a service (DBaaS) , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).

[17]  R. Nithiavathy Data integrity and data dynamics with secure storage service in cloud , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.