Privacy Issues and Protection in Secure Data Outsourcing

Authors

  • Touraj Khodadadi Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, 54100, Kuala Lumpur, Malaysia
  • A. K. M. Muzahidul Islam Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, 54100, Kuala Lumpur, Malaysia
  • Sabariah Baharun Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, 54100, Kuala Lumpur, Malaysia
  • Shozo Komaki Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, 54100, Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.11113/jt.v69.3241

Keywords:

Data owner, privacy, DbaaS, database security, encrypted database

Abstract

Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data.  

References

M. Alizadeh, W. H. Hassan, N. Behboodian, and S. Karamizadeh. 2013. A Brief Review of Mobile Cloud Computing Opportunities. Research Notes in Information Science (RNIS). 12: 155–160.

S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati. 2008. Preserving Confidentiality of Security Policies in Data Outsourcing. In Proceedings of the 7th ACM workshop on Privacy in the electronic society. 75–84.

E. Bertino and R. Sandhu. 2005. Database Security-concepts, Approaches, and Challenges. Dependable and Secure Computing, IEEE Transactions on. 2: 2–19.

B. T Ograph and Y. R. Morgens. 2008. Cloud Computing. Communications of the ACM. 51.

S. D. C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. 2007. A Data Outsourcing Architecture Combining Cryptography and Access Control. In Proceedings of the 2007 ACM workshop on Computer Security Architecture. 63–69.

S. Castano, M. G. Fugini, G. Martella, and P. Samarati. 1995. Database Security. ACM Press Books, Wokingham, England: Addison-Wesley,| c1995. 1.

C. Wang, Q. Wang, K. Ren, and W. Lou. 2010. Privacy-preserving Public Auditing For Data Storage Security In Cloud Computing. In INFOCOM, 2010 Proceedings IEEE. 1–9.

J. He and M. Wang. 2001. Cryptography and Relational Database Management Systems. In Database Engineering and Applications, 2001 International Symposium on. 273–284.

S. Abolfazli, Z. Sanaei, M. Alizadeh, A. Gani, and F. Xia. 2014. An Experimental Analysis on Cloud-based Mobile Augmentation in Mobile Cloud Computing. IEEE Transactions on Consumer Electronics. 60.

M. Alizadeh, W. H. Hassan, M. Zamani, S. Karamizadeh, and E. Ghazizadeh. 2013. Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFID. Journal of Next Generation Information Technology. 4: 65–77.

M. Alizadeh, W. H. Hassan, M. Zamani, and T. Khodadadi. 2013. A Prospective Study of Mobile Cloud Computing. International Journal of Advancements in Computing Technology (IJACT). 5: 198–209.

M. Alizadeh and W. H. Hassan. 2013. Challenges and Opportunities of Mobile Cloud Computing. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International. 660–666.

M. Alizadeh, M. Salleh, M. Zamani, S. Jafar, and K. Sasan. Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID. Kos Island, Greece.

J. Brodkin, 2008. Gartner: Seven Cloud-Computing Security Risks. Infoworld. 1–3.

E. Ghazizadeh, M. Zamani, J.-l. Ab Manan, and M. Alizadeh. 2014. Trusted Computing Strengthens Cloud Authentication. The Scientific World Journal. 17.

Downloads

Published

2014-07-08

How to Cite

Privacy Issues and Protection in Secure Data Outsourcing. (2014). Jurnal Teknologi, 69(6). https://doi.org/10.11113/jt.v69.3241