The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Shamir s Key Based Confidentiality on Cloud Data Storage

Kamalraj Durai,
Cloud computing is a flexible, cost effective and proven delivery platform for providing business or consumer services over the Internet. Cloud computing supports distributed service over the Internet as service oriented architecture, multi-user, and multi-domain administrative infrastructure, hence it is more easily affected by security threats and vulnerabilities. Cloud computing acts as a new paradigm where it provides a dynamic environment for end users and also guarantees Quality of Service (QoS) on data confidentiality. Trusted Third Party ensures the authentication, integrity and confidentiality of involved data and communications but fails on maintain the higher percentage of confidential rate on the horizontal level of privacy cloud services. TrustedDB on the cloud privacy preservation fails to secure the query parsers result for generating efficient query plans. To generate efficient privacy preserving query plans on the cloud data, we propose Shamir’s Key Distribution based Confidentiality (SKDC) Scheme to achieve a higher percentage of confidentiality by residing the cloud data with polynomial interpolation. The SKDC scheme creates a polynomial of degree with the secret as the first coefficient and the remaining coefficients picked up at random to improve the privacy preserving level on the cloud infrastructure. The experimental evaluation using SKDC is carried out on the factors such as system execution time, confidentiality rate and query processing rate, which improves the efficiency of confidentiality rate and query processing while storing and retrieving in cloud.


[1] Abbadi M. and Ruan A., “Towards Trustworthy (5) (6) ,1              n P i jij QoS Hor Privacy Query Ver Privacy     AEffP QueriesQPQueries Shamir’s Key Based Confidentiality on Cloud Data Storage 53 Resource Scheduling in Clouds,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 973-984, 2013.

[2] Foto N., Borkar V., Carey M., Polyzotis N., and Jeffrey D., “Map-Reduce Extensions and Recursive Queries,” in Proceedings of the 14th International Conference on Extending Database Technology, Uppsala, pp. 1-8, 2011.

[3] Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., and Song D., “Provable Data Possession at Untrusted Stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, pp. 598-609, 2007.

[4] Bajaj S. and Sion R., “TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 3, pp. 752-765, 2014.

[5] Bajaj S. and Sion R., “TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, Athens, pp. 205-216, 2011.

[6] Castell S., “Codeo Practice and Management Guidelines for Trusted Third Party Services,” INFOSEC Project Report, 1993.

[7] Ciriani V., Vimercati S., Foresti S., Jajodia S., Paraboschi S., and Samarati P., “Combining Fragmentation and Encryption to Protect Privacy in Data Storage,” ACM Transactions on Information and System Security, vol. 13, no. 3, pp. 13-22, 2010.

[8] Damiani E., Vimercati S., Jajodia S., Paraboschi S., and Samarati P., “Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs,” in Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, pp. 93-102, 2003.

[9] Hashizume K., Rosado D., Fernández-Medina E., and Fernandez E., “An Analysis of Security Issues for Cloud Computing,” Journal of Internet Services and Applications, vol. 4, no. 1, pp. 38- 46, 2013.

[10] Hubbard D. and Sutton M., Top Threats to Cloud Computing v1. 0, Cloud Security Alliance, 2010.

[11] Hudic A., Islam S., Kieseberg P., Rennert S., and Weippl E., “Data Confidentiality Using Fragmentation in Cloud Computing,” International Journal of Communication Networks and Distributed Systems, vol. 1, no. 3- 4, pp. 325-329, 2012.

[12] Sakthivel A., “Enhancing Cloud Security Based on Group Signature,” The International Arab Journal of Information Technology, vol. 14, no. 6, pp. 923-929, 2017.

[13] Shacham H. and Waters B., “Compact Proofs of Retrievability,” in Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, Melbourne pp. 90-107, 2008.

[14] Sugumaran M., Murugan B., and Kamalraj D., “An Architecture for Data Security in Cloud Computing,” in Proceedings of World Congress on Computing and Communication Technologies, Trichirapalli, pp. 252-255, 2014.

[15] Sugumaran M., Murugan B., and Kamalraj D., “An Architecture for Data Security in Cloud Computing,” in Proceedings of the International Conference on Information Technology and Applications, IEEE Computer Society, Trichirappalli, pp. 252-255, 2013.

[16] Wang C., Cao N., Ren K., and Lou W., “Enabling Secure and Efficient Ranked Keyword Search Over Outsourced Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467-1479, 2012.

[17] Wang C., Chow S., Wand Q., Ren K., and Lou W., “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013.

[18] Wang Q., Wang C., Ren K., Lou W., and Li J., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.

[19] Wu S., Li F., Mehrotra S., and Ooi B., “Query Optimization for Massively Parallel Data Processing,” in Proceedings of the 2nd ACM Symposium on Cloud Computing, Cascais, 2011.

[20] Zheng Q., Xu S., and Ateniese G., “Efficient Query Integrity for Outsourced Dynamic Databases,” in Proceedings of the ACM Workshop on Cloud Computing Security, Raleigh, pp. 71-82, 2012.

[21] Zissis D. and Lekkas D., “Addressing Cloud Computing Security Issue,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, 2012. Kamalraj Durai received his MCA degree from St. Joseph’s College, Trichy during 2007 and currently a research scholar in Bharathiar University, Coimbatore, India. His research interest includes parallel and distributed computing, and database.