Combination of Data Masking and Data Encryption for Cloud Database

Article Preview

Abstract:

Database as a service in cloud computing enables the user to create, store, modify, and retrieve data over the Internet. The user does not have to install and maintain the database himself. Instead, the database service provider takes responsibility for installing and maintaining the database. Storing data in a cloud database introduces security risks in data confidentiality, data integrity, and privacy. This research aims to design a method for storing data in a cloud database that provides data confidentiality and privacy and allows querying data. The comparison operations and aggregate functions can be performed on the cloud server. The research employs a combination of data masking and data encryption to achieve the objectives.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

617-620

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Li, Z. Liu, C. Jia, and Z. Dong, Data Masking Generic Model. Proc. Fourth Int. Conf. Emerging Intelligent Data and Web Technologies(2013). pp.724-727.

DOI: 10.1109/eidwt.2013.131

Google Scholar

[2] S. Mukherjee and G.T. Duncan, Disclosure limitation through additive noise data masking: analysis of skewed sensitive data, Proc. Thirtieth Int. Conf. System Sciences, vol. 3 (1997), pp.581-586.

DOI: 10.1109/hicss.1997.661702

Google Scholar

[3] T. Wu, Y. Lin, and I. Lin, A Cloud-User Access Control Mechanism Based on Data Masking, Proc. Sixth Int. Conf. Genetic and Evolutionary Computing (2012), pp.165-168.

DOI: 10.1109/icgec.2012.10

Google Scholar

[4] V.J.R. Winkkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics, Waltham, MA: Elsevier Inc (2011).

Google Scholar

[5] W. Stallings, Cryptography and Network Security, 6th ed., Upper Saddle River, NJ: Prentice Hall (2014).

DOI: 10.1080/19393555.2014.900834

Google Scholar

[6] R.J. Boyle and R.R. Panko, Corporate Computer Security, 4th ed., Upper Saddle River, NJ: Prentice Hall (2014).

Google Scholar

[7] E. Damiani, S. Vimercati, S. Jajodia,S. Paraboschi, and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs. Proc. Tenth ACM Conf. on Computer and Communications Security (2003), pp.93-102.

DOI: 10.1145/948109.948124

Google Scholar

[8] E. Damiani, s. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Key management for multi-user encrypted databases, Proc. ACM Workshop on Storage Security and Survivability (2005), pp.74-83.

DOI: 10.1145/1103780.1103792

Google Scholar

[9] H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, Proc. 2002 ACM SIGMOD Int. Conf. Management of Data (2002), pp.216-227.

DOI: 10.1145/564691.564717

Google Scholar