Secure Storage using TPC-C in Cloud

Authors(4) :-A. Azarudeen, N. Ganesh, R. Dinesh, Mr. R. Ramakrishnan

We propose a architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. The proposed architecture is based on TPC-C standard benchmark for different number of clients and network latencies. Data and metadata are encrypted through the same encryption before being saved. Only trusted clients that already know the master key can decrypt the metadata and acquire information that is necessary. Each metadata can be retrieved by clients through an associated ID, which is the primary key of the metadata storage table. This ID is computed by applying a Message Authentication Code (MAC) function to the name of the object (database or table) described by the corresponding row.

Authors and Affiliations

A. Azarudeen
Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
N. Ganesh
Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
R. Dinesh
Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Mr. R. Ramakrishnan
Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Cloud, Security, Confidentiality, Database

[1] Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases; Luca Ferretti, Michele Colajanni, and Mirco Marchetti,,february-2014

[2] Energy Cost,The Key Challenge of Today’s Data Centers:A Power Consumption Analysis on TPC-C Results,Meikel Poess Raghmath Othayoth Nambiar,2008

[3] R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processing,” Proc. 23rd ACM Symp. Operating Systems Principles, Oct. 2011.

[4] H. Hacigu¨mu¨s¸, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,” Proc. ACM SIGMOD Int’l Conf. Management Data, June 2002.

[5] D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally, “Database Management as a Service: Challenges and Opportunities,” Proc. 25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009.

[6] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motwani, “Distributing Data for Secure Database Services,” Proc. Fourth ACM Int’l Workshop Privacy and Anonymity in the Information Soc., Mar. 2011.

[7] A. Shamir, “How to Share a Secret,” Comm. of the ACM, vol. 22, no. 11, pp. 612-613, 1979.

[8] M. Hadavi, E. Damiani, R. Jalili, S. Cimato, and Z. Ganjei, “AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing,” Proc. Fifth Int’l Workshop Autonomous and Spontaneous Security, Sept. 2013.

[9]   “Transaction Processing Performance Council,” TPC-C, http:// www.tpc.org, Apr. 2013.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 58-61
Manuscript Number : IJSRSET152213
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

A. Azarudeen, N. Ganesh, R. Dinesh, Mr. R. Ramakrishnan, " Secure Storage using TPC-C in Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.58-61, March-April-2015.
Journal URL : http://ijsrset.com/IJSRSET152213

Article Preview

Follow Us

Contact Us