Analysis of Security Techniques Applied in Database Outsourcing
نویسندگان
چکیده
Database Outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider’s site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database. There are chances of hampering the security of the data due to untrustworthiness of service provider. So, to secure the data which is outsourced to third party is a great challenge. The major requirements for achieving security in outsourced databases are confidentiality, privacy, integrity, freshness in case of dynamic updates, access control in multi-user environment, availability and query authentication and assurance. To achieve these requirements various security mechanisms like encryption based approach, fake tuple based approach, customized secret sharing approach, authenticated data structure approach, aggregate-able signature schemes have been put forth till date. In this paper, various mechanisms for implementing security in outsourced databases are analyzed along with their usefulness in a great detail. Keywords— Access Control, Confidentiality, Freshness, Integrity, Outsourced Databases, Query Authentication,
منابع مشابه
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملSecurity of Relational Databases in Business Outsourcing
© Security of Relational Databases in Business Outsourcing Ersin Uzun, Bryan Stephenson HP Laboratories HPL-2008-168 database watermarking, fingerprinting encryption For most corporations the volume of sensitive data used by outsourcing providers continues to increase. As the number of different entities having access to a database increases, it gets harder to prevent and trace-back data leakag...
متن کاملData Security and Privacy for Outsourced Data In the Cloud
Although outsourcing data to cloud storage has become popular, the increasing concerns about data security and privacy in the cloud blocks broader cloud adoption. Ensuring data security and privacy, therefore, is crucial for better and broader adoption of the cloud. This tutorial provides a comprehensive analysis of the state-of-the-art in the context of data security and privacy for outsourced...
متن کاملSecure outsourcing of IT services in a non-trusted environment
This thesis considers the possibilities of secure outsourcing of databases and of content-based routing operations to an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions of the thesis are the following: We e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014