scholarly journals TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud

10.29007/q3wd ◽  
2019 ◽  
Author(s):  
Kawthar Karkouda ◽  
Ahlem Nabli ◽  
Faiez Gargouri

Nowadays cloud computing become the most popular technology in the area of IT industry. It provides computing power, storage, network and software as a service. While building, a data warehouse typically necessitates an important initial investment. With the cloud pay-as-you-go model, BI system can benefit from this new technology. But, as every new technology, cloud computing brings its own risks in term of security. Because some security issues are inherited from classical architectures, some traditional security solutions are used to protect outsourced data. Unfortunately, those solutions are not enough and cannot guarantee the privacy of sensitive data hosted in the Cloud. In particular, in the case of data warehouse, using traditional encryption solutions cannot be practical because those solutions induce a heavy overhead in terms of data storage and query performance. So, a suitable schema must be proposed in order to balance the security and the performance of data warehouse hosted in the cloud. In this paper, we propose (TrustedDW) a homomorphic encryption schema for securing and querying a data warehouse hosted in the cloud.

Author(s):  
Hicham Hamidine ◽  
Ausif Mahmood

Cloud Computing (CC) became one of the prominent solutions that organizations do consider to minimize and lean their information technology infrastructure cost by fully utilizing their resources. However, with all the benefits that CC promises, there are many security issues that discourage clients from making the necessary decision to easily embrace the cloud. To encourage the use of CC, clients need to be able to strategically plan their future investments without the uncertainties of security issues that come with hosting their data in the cloud. This chapter will discuss different mitigation techniques and the common proposed security algorithm schemes for data storage encryption based on classical “symmetric and asymmetric” and with an emphasis on fully homomorphic encryption schemes.


2015 ◽  
pp. 1548-1560
Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.


2019 ◽  
pp. 712-743
Author(s):  
Hicham Hamidine ◽  
Ausif Mahmood

Cloud Computing (CC) became one of the prominent solutions that organizations do consider to minimize and lean their information technology infrastructure cost by fully utilizing their resources. However, with all the benefits that CC promises, there are many security issues that discourage clients from making the necessary decision to easily embrace the cloud. To encourage the use of CC, clients need to be able to strategically plan their future investments without the uncertainties of security issues that come with hosting their data in the cloud. This chapter will discuss different mitigation techniques and the common proposed security algorithm schemes for data storage encryption based on classical “symmetric and asymmetric” and with an emphasis on fully homomorphic encryption schemes.


Author(s):  
R. MYTHILI ◽  
P. PRADHEEBA ◽  
P. RAJESHWARI ◽  
S. PADHMAVATHI

The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer’s outsourced data. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of raptor coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).Using this new scheme it further support security and dynamic operations on data block. Our result shows that, our proposed model provides a secure storage for data in cloud.


Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.


Cloud Computing is a paradigm of distributed computing that delivers on-demand and utility-based services to its customers. It provides a set of shared computing resources such as networking, servers, storage, and applications in the form of services to an organization or an individual. The major benefits of cloud computing include on-demand self-service and cost-effectiveness. For the customer, there is no up-front cost for setting up and running the applications on the cloud. Despite the benefits provided by various cloud services, the outsourcing of data storage and computation raise many new security issues. One of such security issues that have to be addressed before uploading our sensitive data to the cloud is data privacy. With the cloud model, end-users lose control over the physical location of data, because data will be stored and processed elsewhere on the globe and not in the local computer. Hence, we need an algorithm for encrypting the data that can be stored and retrieved from a database managed by the public cloud.


2020 ◽  
Vol 9 (1) ◽  
pp. 13-17
Author(s):  
B. Rasina Begum ◽  
P. Chithra

Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security threats toward users’ outsourced data. Maintaining the log record securely over extended period is very crucial to the proper functioning of any organization. Log holds the record of system events specially user activities. It is the main target for malicious attackers. An attacker, breaking into a system would not try to leave traces of his or her activities behind. This proposed work mainly concentrates on the problem of log security in cloud computing system and using fully homomorphism encryption algorithm in the cloud computing log data.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Ruoshui Liu ◽  
Jianghui Liu ◽  
Jingjie Zhang ◽  
Moli Zhang

Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. However, it keeps the data out of users' hands which would conventionally control and manage the data. Therefore, it becomes the key issue on how to ensure the integrity and reliability of the video data stored in the cloud for the provision of video streaming services to end users. This paper details the verification methods for the integrity of video data encrypted using the fully homomorphic crytosystems in the context of cloud computing. Specifically, we apply dynamic operation to video data stored in the cloud with the method of block tags, so that the integrity of the data can be successfully verified. The whole process is based on the analysis of present Remote Data Integrity Checking (RDIC) methods.


Sign in / Sign up

Export Citation Format

Share Document