Data confidentiality using fragmentation in cloud computing

被引:12
|
作者
Hudic, Aleksandar [1 ]
Islam, Shareeful [2 ]
Kieseberg, Peter [1 ]
Rennert, Sylvi [1 ]
Weippl, Edgar R. [1 ]
机构
[1] SBA Res gGmbH, Vienna, Austria
[2] Univ East London, Sch Architecture Comp & Engn ACE, London, England
关键词
Cloud computing; Data confidentiality; Privacy-preserving; Data fragmentation; Data outsourcing; Data management; Computing;
D O I
10.1108/17427371311315743
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose - The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security along with performance issues by encryption usage of outsourced data are the main motivation points of this research. Design/methodology/approach - This paper presents a method for secure and confidential storage of data in the cloud environment based on fragmentation. The method supports minimal encryption to minimize the computations overhead due to encryption. The proposed method uses normalization of relational databases, tables are categorized based on user requirements relating to performance, availability and serviceability, and exported to XML as fragments. After defining the fragments and assigning the appropriate confidentiality levels, the lowest number of Cloud Service Providers (CSPs) is used required to store all fragments that must remain unlinkable in separate locations. Findings - Particularly in the cloud databases are sometimes de-normalised (their normal form is decreased to lower level) to increase the performance. Originality/value - The paper proposes a methodology to minimize the need for encryption and instead focus on making data entities unlinkable so that even in the case of a security breach for one set of data, the privacy impact on the whole is limited. The paper would be relevant to those people whose main concern is to preserve data privacy in distributed systems.
引用
收藏
页码:37 / +
页数:16
相关论文
共 50 条
  • [1] Ensuring Confidentiality of Healthcare Data using Fragmentation in Cloud Computing
    Andreas, Andreou
    Mavromoustakis, Constandinos X.
    Batalla, Jordi Mongay
    Markakis, Evangelos
    Mastorakis, George
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1991 - 1996
  • [2] Data Obfuscation for Privacy and Confidentiality in Cloud Computing
    Khan, Khaled M.
    Shaheen, Mahboob
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 195 - 196
  • [3] Empowering Users of Cloud Computing on Data Confidentiality
    Khan, Khaled Md
    Shaheen, Mahboob
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 272 - 274
  • [4] A Survey on Data Confidentiality and Privacy in Cloud Computing
    Aloraini, Afnan
    Hammoudeh, Mohammad
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [5] Achieving an effective, confidentiality and integrity of data in cloud computing
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    [J]. International Journal of Network Security, 2019, 21 (02) : 326 - 332
  • [6] The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing
    Rukavitsyn, Andrey N.
    Borisenko, Konstantin A.
    Holod, Ivan I.
    Shorov, Andrey V.
    [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 272 - 274
  • [7] Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography
    Guesmi, Houda
    Sadiane, Leila Azouz
    [J]. 2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 324 - 330
  • [8] Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing
    El Makkaoui, Khalid
    Beni-Hssane, Abderrahim
    Ezzati, Abdellah
    El-Ansari, Anas
    [J]. 8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 33 - 40
  • [9] K-NN Classifier for Data Confidentiality in Cloud Computing
    Zardari, Munwar Ali
    Jung, Low Tang
    Zakaria, Nordin
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [10] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285