Concurrent access on query aware Encrypted Cloud Database

advertisement
Paper Template
Concurrent access on query aware Encrypted Cloud Database
Jayshri C.Wagh
Prof. Sonali Mhatre
Mumbai University
Computer Department
BVCOE, Navi-Mumbai
Mumbai University
Information Technology
BVCOE, Navi-Mumbai
jayshriwagh16@gmail.com
sonalinmhatre@gmail.com
ABSTRACT
Cloud computing enables highly scalable services to be
consume over the Internet. Cloud services are provided on
user request basis. Placing critical and confidential data
outside the premises of an organization and in hands of cloud
providers should come with guarantee that our data should be
secure and available at any point of time. DataBase as a
Service (DBaaS) model is used to manage databases in cloud
environment. When we are storing our database on cloud then
every user should be able to retrieve cloud database
efficiently. Architecture Proposed in this paper provides data
confidentiality for cloud databases. It is designed to allow
multiple and independent clients to connect to the cloud
without intermediate server. Data is encrypted before upload
to the cloud. Multiple cryptography techniques are used to
convert plaintext into encrypted data. Data will not be
exposed to the cloud provider and any other public user who
are not registered to access the database. Encrypted query
submission model is used to secure the query values. Existing
system require the choice of which encryption scheme must
be adopted for each database column and SQL operation at
design time. Some encryption schemes are not able to perform
all query operations on encrypted cloud database. So it
performs limited SQL operation on encrypted database and
set of query are decided at design time only. Proposed system
works even when set of query will change dynamically.
Access control mechanism is used to grant permissions to
users.
Keywords- Public cloud database, security, adaptive,
encryption, confidentiality, onion structure.
INTRODUCTION
Cloud computing is a recent trend in IT that moves computing
and data away from desktop and portable PCs into large data
canters. It refers to applications delivered as services over the
Internet as well as to the actual cloud infrastructure —
namely, the hardware and systems software in data centres
that provide these services.
Today user may spend lot of time with a computer to collect
lot of data over network and store it where it as portable for
the user. During the roaming time user may need the data
from their PC (Personal Computer) it is very difficult to take
it as a portable one with large datasets. So they may problem
occurred while their roaming time. For this reason storing an
enough data in network can solve this problem. Cloud storage
is used to avoid this problem. Cloud storage refers to storing a
large amount of data which in the form of pay-per-use scheme
which is referred to cloud computing. It is used to off-site
storage scheme maintained by a third party i.e. cloud
provider. It is most popular one to store the data in
geographical environment with infinite computing resources
and access the data where the user need without worry about
the data loss. Hence it provides greater availability,
scalability, and reliability to the users. This paper shows the
features are provided by the cloud provider as a service of
Software as a Service (SaaS), Platform as a Service (PaaS),
Infrastructure as a Service (IaaS).
Cloud Database Services
i) Software as a Service (SaaS): This provides a service to the
user by offering different software to the different user over
internet. A distinct instance of service which runs in the
cloud, here one or more user can utilize the service. Here no
charges are detected from the user for the service or software
license. In some cases, charges may detected for the
maintenance of the service [1].
ii) Platform as a Service (PaaS): This provides a service to the
user for the layer of software platform. It provides a storage
mechanism for the various applications and consumptions.
User can have an independency to build their personal
applications that provides infrastructure for the user. It offers
predefined components of combined OS and the application
server, e.g. LAMP platforms [1].
iii) Infrastructure as a Service (IaaS): This provides a service
to the user for the basic storage and processor infrastructure as
a service over the network. It provides service to the computer
infrastructure for the servers, network administrators, data
centre, etc. to handle the workload of this service through
IaaS. For this service user need to pay charges, when they use
this service over network. In this mechanism cloud computing
provides a service over the internet, hardware and software in
data enters as a services. The data centre of hardware and
software is called as Cloud [1].
The IaaS again classify into three types.
i) Database as a Service ii) Storage as a Service
iii) Computing as a service
These types of IaaS are depends on the type of service
provided by it. Among these types our interest is Database as
a Service.
Database as a Service (DBaaS):
This provides a service to the user for their data. It does not
require modifications to the database hence it is controlled by
the cloud provider. Cloud provider manage and direct the
database and aim to avail the instant services to the data users.
Here organizations pay for the database service for getting the
service from the service provider. For the organization with
fewer amounts of resources limited hardware and time-bound
projects, DBaas solve this problem; it is in the bases of pay
per-usage manner. DBaaS is a successful paradigm where the
data and the storage devices are located in cloud infrastructure
and use the data in anywhere by the user [3].
from violating confidentiality of tenant data stored in plain
form, SecureDBaaS adopts multiple cryptographic techniques
to transform plaintext data into encrypted tenant data and
encrypted tenant data structures because even the names of
the tables and of their columns must be encrypted.
SecureDBaaS clients produce also a set of metadata
consisting of information required to encrypt and decrypt data
as well as other administration information. Even metadata
are encrypted and stored in the cloud DBaaS.
Client
Fig 1: Database as a Service Architecture
In some case user have worry about the security and privacy
problems from the cloud provider. Cloud provider provides a
security to the frontend resource only and failed to provide a
security to the backend resources, so the attackers may hack
the data easily from the backend resources. Hence malicious
user could compromise the data integrity and confidentiality.
Where leakage details of data might be in the user’s cloud
resources and cloud provider are the responsible for this issue
[2]. Thus user must provide a security from the cloud provider
between the attackers and the forgoing cloud resources by
encrypting their data. Encryption is a process of encoding the
data in some format i.e. embedding the text in the form of
ciphertext to protect data managed by untrusted server.
EXISTING SYSTEM
Existing system[10] allow multiple and independent clients to
connect directly to the untrusted cloud DBaaS without any
intermediate server. Fig.2 describes the overall architecture. It
assumes that a tenant organization acquires a cloud database
service from an untrusted DBaaS provider. The tenant then
deploys one or more machines (Client 1 through N) and
installs a SecureDBaaS client on each of them. This client
allows a user to connect to the cloud DBaaS to administer it,
to read and write data, and even to create and modify the
database tables after creation. They assume the same security
model that is commonly adopted by the literature in this field
(e.g., [8], [9]), where tenant users are trusted, network is
untrusted, and the cloud provider is honest-but-curious, that
is, cloud service operations are executed correctly, but tenant
information confidentiality is at risk. For these reasons, tenant
data, data structures, and metadata must be encrypted before
exiting from the client. The information managed by
SecureDBaaS includes plaintext data, encrypted data,
metadata, and encrypted metadata. Plaintext data consist of
information that a tenant wants to store and process remotely
in the cloud DBaaS. To prevent an untrusted cloud provider
Fig 2 : SecureDBaaS Architecture
Existing system requires the choice of which encryption
scheme must be adopted for each database column and SQL
operations. These proposals works only when the set of
queries can be statically determined at design time, if
workload may change after the database design so it will not
work dynamically. Some system can perform access control
mechanism without the intervention of cloud provider but do
not allow execution of SQL operations on encrypted data.
PROPOSED SYSTEM
We Proposed architecture which is extension of existing
system [10] describes the overall structure shown in Fig.4.
We assume that a tenant organization acquires a cloud
database service from an untrusted DBaaS provider [10]. The
proposed system supports adaptive encryption for public
cloud database services, where distributed and concurrent
clients can issue direct SQL operations. By avoiding an
architecture based on intermediate servers [8, 9] between the
clients and the cloud database, the proposed solution
guarantees the same level of scalability and availability of the
cloud service. All data and metadata stored in the cloud
database are encrypted. This system stores overall database in
encrypted form. In this system details of the user and what he
wants to store on the cloud both stores in cloud. As per the
requirement, the database designer will store user data using
onion structure (adaptive encryption scheme [8]), because
using normal encryption tenant are not able to perform all
SQL operations. The adaptive encryption scheme, which was
initially proposed for applications not referring to the cloud,
encrypts each plain column into multiple encrypted columns,
and each value is encapsulated into different layers of
encryption, so that the outer layers guarantee higher
confidentiality but support fewer computation capabilities
with respect to the inner layers. In proposed system each plain
column of the table is encrypted into one or more columns
which depends on the need of database designer. It is
encrypted into multiple columns then it will provide higher
confidentiality. If number of encrypted layers are more then it
is very difficult to perform operation over those columns as
compared to the inner layer so it will provide higher security
and confidentiality. Legitimate client can transparently issue
SQL operations (e.g., SELECT, INSERT, UPDATE and
DELETE) to the encrypted cloud database through the
encrypted database interface. Every user has assign privilege
according to access policy he can perform SQL operation on
the encrypted cloud database. Every user can store a file on
the cloud in encrypted form. Same file can be access or
download by users using same access policies.
Fig 4: System Architecture
The DBA shown in fig.4 is the only subject that owns root
credentials for the DBA client, and that no internal nor
external attackers are able to access, steal or crack the
credentials. The DBA manages user accounts, and enforces
the tenant access control policies [11]. These policies
represent the set of rules adopted by the tenant organization to
define which user can access to which subset of tenant data.
The importance of data isolation through access control
policies should be clear: the tenant users must access all and
only authorized data where authorizations are specified as if
the database was maintained by the tenant.
RELATED WORK
Adaptive encryption schemes SQL-aware encryption
schemes [8] that guarantee data confidentiality and allow the
cloud database server to execute SQL operations over
encrypted data. As each algorithm supports a specific subset
of SQL operators, we refer to the following encryption
schemes.
• Random (Rand): it is the most secure encryption (IND-CPA)
because it does not reveal any information about the original
plain value. It does not support any SQL operator, and it is
used only for data retrieval.
• Deterministic (Det): it deterministically encrypts data, so
that equality of plaintext data is preserved. It supports the
equality operator.
• Order Preserving Encryption (Ope): it preserves in the
encrypted values the numerical order of the original
unencrypted data. It supports the comparison SQL operators
(i.e., =,<,≤,>,≥).
• Homomorphic Sum (Sum) [: it is homomorphic with respect
to the sum operation, so that the multiplication of encrypted
integers is equal to the sum of plaintext integers. It supports
the sum operator between integer values.
• Search (Search): it supports equality check on full strings
(i.e., the LIKE operator).
• Plain: it does not encrypt data; it is useful to support all SQL
operators on non-confidential data.
The innovation of the proposed models and schemes is to
enforce access control mechanisms on cloud databases while
allowing the execution of SQL operations on encrypted data
stored in the cloud that are accessible by any tenant cloud
client. At the best of our knowledge, no existing proposal is
able to satisfy both requirements. For example, there are
encryption schemes that enforce access control mechanisms
for cloud storage services [12], and other solutions that
support concurrent accesses from independent clients [13].
Using query-aware encryption algorithms [8] allow a user to
obtain all and only the requested data from the database, but
that proposal is based on a trusted proxy that intercepts all
operations between the tenant clients and the encrypted
database, executes data re-encryption, and implements access
control policies as in a privately managed infrastructure.
CONCLUSION
In this paper we have shown that cloud tenants can take full
advantage of DBaaS qualities like accessibility, security and
reliability while not exposing encrypted knowledge to the
cloud provider. It permits multiple and regionally distributed
clients to execute concurrent operations on encrypted data. It
eliminates intermediate server between the tenant and cloud
provider.Client registration details are stored in cloud
database using adaptive encryption scheme. Clients are
capable of reading and writing data on cloud database which
is stored in encrypted form. The scheme proposed in this
paper allows a client to encrypt all stored and transmitted
data, to enforce standard database access control mechanisms
where each tenant user has a different secret key, and to
support the execution of SQL operations on encrypted data
stored in a public cloud provider.
REFERENCES
1. Ashalatha, r., and m. Vaidehi. "The significance of data
security in cloud: a survey on challenges and solutions on data
security”.
2. Arora, Indu, and Anu Gupta. "Cloud Databases: A
Paradigm Shift in Databases." International J. of Computer
Science Issues 9.4 (2012): 77-83.
3. D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally,
“Database Management as a Service: Challenges and
Opportunities,” Proc. 25th IEEE Int’l Conf. Data Eng., Mar.Apr. 2009.
4. V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina,
and R.Motwani, “Distributing Data for Secure Database
Services,” Proc. Fourth ACM Int’l Workshop Privacy and
Anonymity in the Information Soc., Mar. 2011.
5.
“Oracle
Advanced
Security,”
Oracle
Corporatiohttp://www.oracle.com/technetwork/database/optio
ns/advanced-security, Apr. 2013.
6. M. Hadavi, E. Damiani, R. Jalili, S. Cimato, and Z. Ganjei,
“AS5: A Secure Searchable Secret Sharing Scheme for
Privacy Preserving Database Outsourcing,” Proc. Fifth Int’l
Workshop Autonomous and Spontaneous Security, Sept.
2013.
7. E. Damiani, S.D.C. Vimercati, S. Jajodia, S. Paraboschi,
and P. Samarati, “Balancing Confidentiality and Efficiency in
Untrusted Relational Dbmss,” Proc. Tenth ACM Conf.
Computer and Comm. Security, Oct. 2003.
8. R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H.
Balakrishnan,“CryptDB: Protecting Confidentiality with
Encrypted Query Processing,” Proc. 23rd ACM Symp.
Operating Systems Principles, Oct. 2011.
9. H. Hacigu¨mu¨ s¸, B. Iyer, C. Li, and S. Mehrotra,
“Executing SQL over Encrypted Data in the DatabaseService-Provider Model,” Proc. ACM SIGMOD Int’l Conf.
Management Data, June 2002.
10.L. Ferretti, M. Colajanni, and M. Marchetti, “Distributed,
concurrent,and independent access to encrypted cloud
databases,” IEEETrans. Parallel Distrib. Syst., vol. 25, no. 2,
pp. 437–446, Feb. 2014.
11. L. Ferretti, M. Colajanni, and M. Marchetti, “Access
control enforcement of query-aware encrypted cloud
databases,” in Proc. 5th IEEE Int. Conf. Cloud Comput.
Technol. Sci., Dec. 2013,pp. 717–722.
12. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure,
scalable, and fine-grained data access control in cloud
computing,” in Proc. of the IEEE INFOCOM, March 2010.
13. A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W.
Felten, “Sporc: group collaboration using untrusted cloud
resources,” in Proc. of the 9th USENIX conference on
Operating Systems Design and Implementation, October
2010.
Download