A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Scalable semantic web data management using vertical partitioning
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Supporting table partitioning by reference in oracle
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A Novel Framework for Database Security Based on Mixed Cryptography
ICIW '09 Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services
Achieving Information Security in Network Computing Systems
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing
CLOUD '10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
On the impossibility of cryptography alone for privacy-preserving cloud computing
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Privacy-preserving data sharing in cloud computing
Journal of Computer Science and Technology
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Journal of Network and Computer Applications
Secure virtualization for cloud computing
Journal of Network and Computer Applications
A Privacy Preserving System for Cloud Computing
CIT '11 Proceedings of the 2011 IEEE 11th International Conference on Computer and Information Technology
Lucy in the sky without diamonds: Stealing confidential data in the cloud
DSNW '11 Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security
User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Secure and privacy preserving keyword searching for cloud storage services
Journal of Network and Computer Applications
Hi-index | 0.00 |
In the rising paradigm of cloud computing, attainment of sustainable levels of cloud users' trust in using cloud services is directly dependent on effective mitigation of its associated impending risks and resultant security threats. Among the various indispensible security services required to ensure effective cloud functionality leading to enhancement of users' confidence in using cloud offerings, those related to the preservation of cloud users' data privacy are significantly important and must be matured enough to withstand the imminent security threats, as emphasized in this research paper. This paper highlights the possibility of exploiting the metadata stored in cloud's database in order to compromise the privacy of users' data items stored using a cloud provider's simple storage service. It, then, proposes a framework based on database schema redesign and dynamic reconstruction of metadata for the preservation of cloud users' data privacy. Using the sensitivity parameterization parent class membership of cloud database attributes, the database schema is modified using cryptographic as well as relational privacy preservation operations. At the same time, unaltered access to database files is ensured for the cloud provider using dynamic reconstruction of metadata for the restoration of original database schema, when required. The suitability of the proposed technique with respect to private cloud environments is ensured by keeping the formulation of its constituent steps well aligned with the recommendations proposed by various Standards Development Organizations working in this domain.