Loading...

A Confidentiality and Integrity Preserving Architecture for Secure Data Outsourcing

Shahrokhi, Hesamoddin | 2015

413 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 47730 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Jalili, Rasool
  7. Abstract:
  8. Infrastructural costs of data management, have led people and organizations to outsource their data. This approach is facing with some significant security challenges and risks. The goal of this research, is to present an architecture for secure outsourcing of data in a way that used methods, storage processes, query processing methods and access control mechanisms work together to preserve confidentiality and integrity of outsourced data. In this architecture, the main challenge is transparent placement of some components between client and server in order to prevent user from being aware of communication with a secured server. In order to create this degree of transparency, we need to pay attention to some factors like appropriate performance, not limiting possible operations on the data and preventing client to be overloaded. Some of the existing similar architectures such as CryptDB and SMM are based on various characteristics of different types of cryptography and the others are based a non-modifiable hardware component, and on these bases, they provide ability of query processing on encrypted data. On the other hand, those architectures often have concerned about confidentiality and not have any concern about integrity of data. Our proposed architecture uses a hybrid approach of the current methods and also pay attention to the problem of integrity. A pilot version of this architecture will be implemented, and after evaluation, feasibility of execution of routine qureries, with some performance degradations will be shown. Finally, some suggestions for eliminitation of low performance problem will be presented
  9. Keywords:
  10. Data Integrity ; Database ; Cryptography ; Data Outsourcing

 Digital Object List

 Bookmark

No TOC