Skip to main content

2015 | OriginalPaper | Buchkapitel

Securing Database Server Using Homomorphic Encryption and Re-encryption

verfasst von : Sarath Greeshma, R. Jayapriya

Erschienen in: Security in Computing and Communications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A problem with organizations for shifting their storage to cloud or remote server is maintenance of confidentiality, integrity and availability of outsourced data,especially if the remote server is not trusted. Encryption can be used as a solution to these security concerns. But it should be possible for the data owner and other authenticated users of the data to perform queries (especially statistical queries) over data in encrypted domain. Usage of symmetric encryption will create another security concerns like management of key, denying a user from querying data etc. The problem with asymmetric encryption technique is only owner of the data is allowed to decrypt the data with his private key.
In this paper we proposed a solution to all these problems by designing an asymmetric fully homomorphic encryption algorithm to encrypt the data. Encryption is done using public key of the owner. So that only owner can decrypt it with his own private key. If owner wants to allow a third party or delegate to perform query over encrypted data then owner will calculate a re-encryption key for him, so that authorized delegates can submit queries to database server and re-encrypt the query result with this re-encryption key so that delegate can decrypt it with his own private key.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pathak, A.R., Padmavathi, B.: Survey of confidentiality and integrity in outsourced databases. Int. J. Sci. Eng. Technol. (IJSET) 2(3) (2013) Pathak, A.R., Padmavathi, B.: Survey of confidentiality and integrity in outsourced databases. Int. J. Sci. Eng. Technol. (IJSET) 2(3) (2013)
2.
Zurück zum Zitat Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in RDBMS. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 147–164. Springer, Heidelberg (2004) CrossRef Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in RDBMS. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 147–164. Springer, Heidelberg (2004) CrossRef
3.
Zurück zum Zitat Ciriani, V., et al.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(3), 1–33 (2010)CrossRef Ciriani, V., et al.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(3), 1–33 (2010)CrossRef
4.
Zurück zum Zitat Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: 18th International Conference on Data Engineering, February 2002 Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: 18th International Conference on Data Engineering, February 2002
5.
Zurück zum Zitat Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007, 10 (2007) Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007, 10 (2007)
6.
Zurück zum Zitat Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic encryption applied to the cloud computing security. In: Proceedings of the World Congress on Engineering, vol. 1 (2012) Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic encryption applied to the cloud computing security. In: Proceedings of the World Congress on Engineering, vol. 1 (2012)
7.
Zurück zum Zitat Singh, N., Ahuja, R.: Fuzzy based fully homomorphic encryption scheme for security in cloud computing. Int. J. Sci. Res. (IJSR) (2012) Singh, N., Ahuja, R.: Fuzzy based fully homomorphic encryption scheme for security in cloud computing. Int. J. Sci. Res. (IJSR) (2012)
8.
Zurück zum Zitat Mambo, M., Okamoto, E.: Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences 80(1), 54–63 (1997) Mambo, M., Okamoto, E.: Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences 80(1), 54–63 (1997)
9.
Zurück zum Zitat Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998) CrossRef Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998) CrossRef
10.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC)
11.
Zurück zum Zitat Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831–871 (2014)CrossRefMATH Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831–871 (2014)CrossRefMATH
12.
Zurück zum Zitat Gentry, C., Halevi, S.: Implementing Gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011) CrossRef Gentry, C., Halevi, S.: Implementing Gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011) CrossRef
Metadaten
Titel
Securing Database Server Using Homomorphic Encryption and Re-encryption
verfasst von
Sarath Greeshma
R. Jayapriya
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_27