Secure Storage using TPC-C in Cloud

Authors

  • A. Azarudeen  Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • N. Ganesh  Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • R. Dinesh  Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • Mr. R. Ramakrishnan  Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

Cloud, Security, Confidentiality, Database

Abstract

We propose a architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. The proposed architecture is based on TPC-C standard benchmark for different number of clients and network latencies. Data and metadata are encrypted through the same encryption before being saved. Only trusted clients that already know the master key can decrypt the metadata and acquire information that is necessary. Each metadata can be retrieved by clients through an associated ID, which is the primary key of the metadata storage table. This ID is computed by applying a Message Authentication Code (MAC) function to the name of the object (database or table) described by the corresponding row.

References

[1] Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases; Luca Ferretti, Michele Colajanni, and Mirco Marchetti,,february-2014

[2] Energy Cost,The Key Challenge of Today’s Data Centers:A Power Consumption Analysis on TPC-C Results,Meikel Poess Raghmath Othayoth Nambiar,2008

[3] R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processing,” Proc. 23rd ACM Symp. Operating Systems Principles, Oct. 2011.

[4] H. Hacigu¨mu¨s¸, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,” Proc. ACM SIGMOD Int’l Conf. Management Data, June 2002.

[5] D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally, “Database Management as a Service: Challenges and Opportunities,” Proc. 25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009.

[6] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motwani, “Distributing Data for Secure Database Services,” Proc. Fourth ACM Int’l Workshop Privacy and Anonymity in the Information Soc., Mar. 2011.

[7] A. Shamir, “How to Share a Secret,” Comm. of the ACM, vol. 22, no. 11, pp. 612-613, 1979.

[8] M. Hadavi, E. Damiani, R. Jalili, S. Cimato, and Z. Ganjei, “AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing,” Proc. Fifth Int’l Workshop Autonomous and Spontaneous Security, Sept. 2013.

[9]   “Transaction Processing Performance Council,” TPC-C, http:// www.tpc.org, Apr. 2013.

Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
A. Azarudeen, N. Ganesh, R. Dinesh, Mr. R. Ramakrishnan, " Secure Storage using TPC-C in Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.58-61, March-April-2015.