VRS-DB: Computation Exploration on Encrypted Database

The security problems occur in the cloud data storage environment under the DBaaS framework, in which the DO (data-owner) publicizes information over the cloud data storage SP(service-provider). For securing the confidentiality, privacy, integrity, atomicity, isolation of the information, DO just change the form of the data by encrypting it to another secure form, and then DO upload that secured data over the SP. Present encryption plans, in any case, are just halfway homomorphic as in each of them was intended to enable one particular sort of calculation to be done on encoded information. These current plans can’t be incorporated to answer genuine down to earth questions that include operations of various types. For that we proposed a new scheme VRS-DB, which offers protected query computation and exploration of encrypted database in a cloud computing. In particular, we address security problems in a cloud data storage framework, where scrambled appropriated information is queried under an unidentified sharing conventions. The framework gives an arrangement of rudimentary information interoperable administrators on scrambled information, which permits an extensive variety of SQL questions to be handled by the SP on encrypted data. This demo exhibits a VRS-DB model.

[1]  Kunwar Singh Vaisla,et al.  Privacy and Security of User's Sensitive Data: A Viable Analysis , 2017, RICE.

[2]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[4]  Craig Gentry,et al.  Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..

[5]  Hongji Yang,et al.  Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[6]  Alfred Menezes,et al.  Handbook Of Applied Cryptography Crc Press , 2015 .

[7]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[8]  Lei Li,et al.  MongoDB NoSQL Injection Analysis and Detection , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[9]  Yonggang Wen,et al.  StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption , 2015, 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI).

[10]  Dharavath Ramesh,et al.  Data modelling for discrete time series data using Cassandra and MongoDB , 2016, 2016 3rd International Conference on Recent Advances in Information Technology (RAIT).

[11]  Hongwei Li,et al.  Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.

[12]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[13]  Hari Balakrishnan,et al.  CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.

[14]  S. Ramachandram,et al.  Multi user searchable encryption schemes using Trusted Proxy for cloud based Relational Databases , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[15]  Min Wu,et al.  A transparent middleware for encrypting data in MongoDB , 2014, 2014 IEEE Workshop on Electronics, Computer and Applications.

[16]  Hari Balakrishnan,et al.  CryptDB: processing queries on an encrypted database , 2012, CACM.

[17]  Xiaodong Lin,et al.  Achieving authorized and ranked multi-keyword search over encrypted cloud data , 2015, 2015 IEEE International Conference on Communications (ICC).

[18]  Samuel Madden,et al.  Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..

[19]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[20]  Radu Sion,et al.  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.