Secure Storage using TPC-C in Cloud
Keywords:
Cloud, Security, Confidentiality, DatabaseAbstract
We propose a architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. The proposed architecture is based on TPC-C standard benchmark for different number of clients and network latencies. Data and metadata are encrypted through the same encryption before being saved. Only trusted clients that already know the master key can decrypt the metadata and acquire information that is necessary. Each metadata can be retrieved by clients through an associated ID, which is the primary key of the metadata storage table. This ID is computed by applying a Message Authentication Code (MAC) function to the name of the object (database or table) described by the corresponding row.
References
[1] Distributed, Concurrent, and Independent Access
to Encrypted Cloud Databases; Luca Ferretti, Michele Colajanni, and Mirco Marchetti,,february-2014
[2] Energy Cost,The Key Challenge of Today’s Data
Centers:A Power Consumption Analysis on TPC-C Results,Meikel Poess Raghmath
Othayoth Nambiar,2008
[3] R.A. Popa, C.M.S. Redfield, N. Zeldovich, and
H. Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query
Processing,†Proc. 23rd ACM Symp. Operating Systems Principles, Oct. 2011.
[4] H. Hacigu¨mu¨s¸, B. Iyer, C. Li, and S.
Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider
Model,†Proc. ACM SIGMOD Int’l Conf. Management Data, June 2002.
[5] D. Agrawal, A.E. Abbadi, F. Emekci, and A.
Metwally, “Database Management as a Service: Challenges and Opportunities,â€
Proc. 25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009.
[6] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina,
and R. Motwani, “Distributing Data for Secure Database Services,†Proc. Fourth
ACM Int’l Workshop Privacy and Anonymity in the Information Soc., Mar. 2011.
[7] A. Shamir, “How to Share a Secret,†Comm. of
the ACM, vol. 22, no. 11, pp. 612-613, 1979.
[8] M. Hadavi, E. Damiani, R. Jalili, S. Cimato,
and Z. Ganjei, “AS5: A Secure Searchable Secret Sharing Scheme for Privacy
Preserving Database Outsourcing,†Proc. Fifth Int’l Workshop Autonomous and
Spontaneous Security, Sept. 2013.
[9]  “Transaction Processing Performance Council,â€
TPC-C, http:// www.tpc.org, Apr. 2013.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.