QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX

نویسندگان

چکیده

Due to the concern on cloud security, digital encryption is applied before outsourcing data for utilization. This introduces a challenge about how efficiently perform queries over ciphertexts. Crypto-based solutions currently suffer from limited operation support, high computational complexity, weak generality, and poor verifiability. An alternative method that utilizes hardware-assisted Trusted Execution Environment (TEE), i.e., Intel SGX, has emerged offer efficiency, generality flexibility. However, SGX-based lack support multi-user query control security compromises caused by untrustworthy TEE function invocation, e.g., key revocation failure, incorrect results, sensitive information leakage. In this article, we leverage SGX propose secure efficient SQL-style framework named QShield. Notably, novel lightweight secret sharing scheme in QShield enable control; it effectively circumvents avoids cumbersome remote attestation authentication. We further embed trust-proof mechanism into guarantee trustworthiness of invocation; ensures correctness results alleviates side-channel attacks. Through formal analysis, proof-of-concept implementation performance evaluation, show can securely outsourced with efficiency scalable support.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage

As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial...

متن کامل

Over-encryption: Management of Access Control Evolution on Outsourced Data

Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to be addressed in this context concerns the enforcement of selective authorization policies and the support of policy updates in dynamic scenarios. In this paper, we present a novel solution to the enforcement of access c...

متن کامل

A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage

Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive fo...

متن کامل

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Parallel and Distributed Systems

سال: 2021

ISSN: ['1045-9219', '1558-2183', '2161-9883']

DOI: https://doi.org/10.1109/tpds.2020.3024880