Research Article

Secure Database in Cloud Computing - CryptDB Revisited

Volume: 3 Number: 1 March 31, 2014
  • Ziynet Dayıoğlu
EN

Secure Database in Cloud Computing - CryptDB Revisited

Abstract

Databases contain most valuable personal, economic, and government information. They are most desirable to the malicious adversaries and therefore, it is very critical to protect against all possible adversarial behavior. With the recent rapid growth in the availability and popularity of cloud services, many personal and business and government information are now moving to the Cloud. Therefore, databases are more difficult to protect because of new security and privacy issues. Various techniques have been proposed to solve the outsourcing database scenarios which preserve a certain degree of confidentiality while still allowing to execute some SQL queries efficiently. CryptDB is a new database management system for protecting data confidentiality while preserving confidentiality and performing a standard set of SQL queries in an efficient way. CryptDB seems to be practical compared to other attempts at solving the problem of computing with encrypted data and the database can be fully moved to the Cloud with no security concern because all the data are already encrypted and never revealed to the database administrator. In this paper, we revisit CryptDB from cryptographic point of view. We first describe it in more details for ease of understanding and then highlight the drawbacks of CryptDB from security and efficiency points of view.

Keywords

References

  1. R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrish- nan, ”CryptDB: protecting confidentiality with encrypted query processing”, In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP ’11), Cascais, Portu- gal, pp.85-100, ACM New York, USA; October 23-26, 2011, DOI=10.1145/2043556.2043566
  2. R.A. Popa, F.H. Li, and N. Zeldovich, ”An Ideal-Security Protocol for Order-Preserving Encoding”, In Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP ’13), pp.463-477, IEEE Computer Society, Washington, USA; 2013. DOI=10.1109/SP.2013.38
  3. A. Boldyreva, N. Chenette, Y. Lee and A. O’Neill, ”Order- preserving symmetric encryption”, In Eurocrypt ’09, Proceed- ings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques, 224-241, Springer, 2009. ISBN: 978-3-642-01000-2 DOI=10.1007/978-3-642-01001-9 13
  4. D.X. Song, D. Wagner, and A. Perrig, ”Practical Techniques for Searches on Encrypted Data”, In Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP ’00), 44-, IEEE Computer Society, Washington, DC, USA, 2000.
  5. C. Gentry, ”Fully homomorphic encryption using ideal lattices”, In Proceedings of the forty-first annual ACM symposium on Theory of computing (STOC ’09), 169-178, ACM, New York, USA, 2009. DOI=10.1145/1536414.1536440
  6. www.csrc.nist.gov/publications/nistpubs/800-145/SP800- 145.pdf, ”The NIST Definition of Cloud Computing, National Institute of Standards and Technology”, NIST SP 800-145. Latest access March 7, 2014.
  7. www.jackofallclouds.com, G. Rosen, ”Amazon usage estimates and updates”. Latest access March 7, 2014.
  8. Y. Zhang, A. Juels, M.K. Reiter, and T. Ristenpart, ”Cross- VM side channels and their use to extract private keys”, In Proceedings of the 2012 ACM conference on Computer and communications security (CCS ’12), ACM, New York, NY, USA, 305-316, 2012.

Details

Primary Language

English

Subjects

Applied Mathematics

Journal Section

Research Article

Authors

Ziynet Dayıoğlu This is me

Publication Date

March 31, 2014

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2014 Volume: 3 Number: 1

APA
Dayıoğlu, Z. (2014). Secure Database in Cloud Computing - CryptDB Revisited. International Journal of Information Security Science, 3(1), 129-147. https://izlik.org/JA98ZY84WS
AMA
1.Dayıoğlu Z. Secure Database in Cloud Computing - CryptDB Revisited. IJISS. 2014;3(1):129-147. https://izlik.org/JA98ZY84WS
Chicago
Dayıoğlu, Ziynet. 2014. “Secure Database in Cloud Computing - CryptDB Revisited”. International Journal of Information Security Science 3 (1): 129-47. https://izlik.org/JA98ZY84WS.
EndNote
Dayıoğlu Z (March 1, 2014) Secure Database in Cloud Computing - CryptDB Revisited. International Journal of Information Security Science 3 1 129–147.
IEEE
[1]Z. Dayıoğlu, “Secure Database in Cloud Computing - CryptDB Revisited”, IJISS, vol. 3, no. 1, pp. 129–147, Mar. 2014, [Online]. Available: https://izlik.org/JA98ZY84WS
ISNAD
Dayıoğlu, Ziynet. “Secure Database in Cloud Computing - CryptDB Revisited”. International Journal of Information Security Science 3/1 (March 1, 2014): 129-147. https://izlik.org/JA98ZY84WS.
JAMA
1.Dayıoğlu Z. Secure Database in Cloud Computing - CryptDB Revisited. IJISS. 2014;3:129–147.
MLA
Dayıoğlu, Ziynet. “Secure Database in Cloud Computing - CryptDB Revisited”. International Journal of Information Security Science, vol. 3, no. 1, Mar. 2014, pp. 129-47, https://izlik.org/JA98ZY84WS.
Vancouver
1.Ziynet Dayıoğlu. Secure Database in Cloud Computing - CryptDB Revisited. IJISS [Internet]. 2014 Mar. 1;3(1):129-47. Available from: https://izlik.org/JA98ZY84WS