Professional Documents
Culture Documents
ABSTRACT
Data confidentiality is the main issue while handling
critical data with the cloud provider. Also the data
should be available at rest, in motion and in use.So here
I propose architecture to provide security on cloud. Also
the possibility of executing concurrent operation on
encrypted data is analyzed. This is the solution for
supporting geographically distributed clients to connect
directly to an encrypted cloud data base.They can also
execute concurrent and independent operationincluding
modifying the database structure.The intermediate
proxies that limit the elasticity, availability and
scalability properties are eliminated in the proposed
architecture. Theoretical analysis and experimental
results based on a prototype implementation for different
numbers of clients are required to evaluate the efficiency
of the proposed architecture.
Key words: Cloud computing, Security, Confidentiality,
SecureDBaaS, Databases.
1. INTRODUCTION
Information is placed in third parties, ensuring data
confidentiality, in a cloud context. Plaintext data is
accessible only for trustedparties which do not include
cloud providers, intermediaries, and Internet .Data must
be encrypted in any untrusted context. Several solutions
are there for ensuring confidentiality for the storage as a
service model, while ensuring confidentiality in the
database as a service (DBaaS) model is an open research
area. So here, I propose SecureDBaaS as a solution that
allows cloud tenants to take full advantage of DBaaS
qualities such as availability, reliability, and elastic
scalability. This is achieved without exposing
unencrypted data to the cloud provider. The architecture
design was inspired by allow multiple, independent, and
geographically distributed clients to execute concurrent
operations over the encrypted data, including SQL
statements that modify the database structure to attain
data confidentiality and consistency at the client and
cloud level. SecureDBaaS integrates existing
cryptographic schemes and novel strategies for
management of encrypted metadata on the untrusted
cloud database. So here my intention is to suggest a
solution for data consistency issues due to concurrent
and independent client accesses to encrypted data.
2. RELATED WORK
SecureDBaaS provides several features that differentiate
it from earlier work in the field of security for remote
database services.
It ensures data confidentiality by allowing a cloud
database server to execute concurrent SQL
operations,not only read/write, but also
modifications to the database structure, over
encrypted data.
It provides the same availability, elasticity, and
scalability of the original cloud DBaaS due to the
reason that it does not require any intermediate
server. Response times are affected by
cryptographic overheads that for most SQL
operations are masked by network latencies.
Multiple clients can access concurrently and
independently a cloud database service.
It is compatible with the most popular relational
database servers, and it is applicable to different
DBMS implementations.
3. METHODOLOGY
SecureDBaaS store just tenant data in the cloud
database, and save metadata in the client machine [10] or
split metadata between the cloud database and a trusted
proxy [11]. This can be shown with an example, for
metadata synchronization, and practicallyit is difficultto
www.ijsret.org
190
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
www.ijsret.org
191
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
3.3 Operations
There are mainly three types of operations.
Setup Phase, showshow to initialize a
SecureDBaaS architecture from a cloud
databaseservice acquired by a tenant from a
cloud provider.
Sequential SQL Operations deals with the SQL
operations in SecureDBaaS by considering
aninitial simple scenario in which I assume that
the cloud database is accessed by oneclient.
Concurrent SQL Operations deals with the
support to concurrent execution of SQL
statements issued by multiple independent
clients areone of the most important benefits of
SecureDBaaS.
4. RESULTS
A simple database engine is created that provides all the
features such as availability, reliability and elastic
scalability without exposing uncrypted data to the cloud
provider. Original plaintext data should be accessible
only by trusted parties and do not include cloud
providers, intermediaries, and internet. The architecture
allow multiple, independent and geographically
distributed clients to execute concurrent operations on
encrypted data, including SQL queries that modify the
structure of the database and also create any client
application that accessing its service. The SecureDBaaS
architecture is created to cloud platforms and does not
introduce any intermediary proxy or broker server in
between the client and the cloud provider.
5. CONCLUTIONS
The proposed architecture is an innovative one that
ensures confidentiality of data stored in public cloud
databases. A large part of the research provides solutions
to support concurrent SQL queries containing statements
modifying the database structure. An encrypted data
issued by heterogeneous and possibly geographically
distributed clients. Modifications to the cloud database
does not require in the proposed architecture. This is
applicable to existing cloud DBaaS, like experimented
Postgre SQL plus Cloud Database, Windows Azure, and
Xeround.
REFERENCES
[1] L. Ferretti, M. Colajanni, and M. Marchetti,
Distributed, concurrent,
andindependentaccess to
encrypted cloud databases, Parallel and Distributed
Systems, IEEE Transactions on, vol. 25, no. 2, pp. 437
446, 2014.
[2] H. D. Strowd and G. A. Lewis, T-check in systemof-systems technologies: Cloud computing, 2010.
www.ijsret.org
192