Abstract
Cloud Computing is a vast technology with high economic benefits, with low cost, many industries planning to store their information on cloud maintained by a third party are Third-Party Storage provider (TSP). Sometimes curious or malicious administrators may leak data in the TSP. CryptDB provides confidentiality works by executing the user SQL queries about encrypted data using Onion Encryption. Another threat is from cloud users, where they try to secure the systems against external adversaries with a secured user login and secure end-to-end encrypted connections. Though, the internal adversaries remain also the biggest threat from this case. The proposed security method of applying Elliptic Curve Diffie–Hellman Ephemeral in CP-ABE (Cipher Text Attribute-Based Encryption) technique for Key Exchange Policy. CP-ABE is a fine-grained access control with the policy of Attribute Authority (AA) to a user is having Secret Key (SK) based on the set of character attributes. Elliptic Curve Diffie–Hellman Ephemeral is a well-known technique in key exchange policy. Combining CP-ABE with Elliptic Curve Diffie–Hellman Ephemeral is proposed for the ECDHE-ZeroVi’s framework.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (20111) Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the twenty-third ACM symposium on operating systems principles, SOSP 2011, ACM, New York, pp 85–100
Solomon MG, Sunderam V, Xiong L (2014) Towards secure cloud database with fine-grained access control. In: Department of Mathematics & Computer Science Emory University Atlanta, Georgia 30322, USA
Bethencourt J, Sahai A, Waters B (2007) Cipher text-policy attribute-based encryption. In: IEEE symposium on security and privacy, IEEE Computer Society, pp 321–334
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) CRYPTO 2001, vol 2139. LNCS. Springer, Heidelberg, pp 213–229
Fiat A, Naor M (1994) Broadcast encryption. In: Stinson DR (ed) CRYPTO 1993, LNCS, vol 773, Springer, Heidelberg, pp 480–491
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, ACM, New York, pp 89–98
Kim J, Susilo W, Au MH, Seberry J (2014) Efficient semi-static secure broadcast encryption scheme. In: Cao Z, Zhang F (eds) Pairing 2013, vol 8365. LNCS. Springer, Heidelberg, pp 62–76
Phan D-H, Pointcheval D, Shahandashti SF, Strefler M (2013) Adaptive cca broadcast encryption with constant-size secret keys and ciphertexts. Int J Inf Secur 12(4):251–265
Armbrust M et al (2009) Above the clouds: a berkeley view of cloud computing [Technical report]. EECS Department, University of California, Berkeley
Arrington M (2006) Gmail disaster: reports of mass email deletions.http://www.techcrunch.com/2006/12/28/gmail-disasterreports-ofmassemail-deletions
Erway C et al (2009) Dynamic provable data possession. In: Proceedings of the 16th ACM conference on computer and communications security (CCS). ACM, pp 213–222
Boneh D et al (2005) Hierarchical identity based encryption with constant size cipher text. In: Advances in cryptology eEUROCRYPT, Springer
Ostrovsky R (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security (CCS), pp 195–203
Samarati P, De Capitani di Vimercati S (2010) Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on information, computer and communications security (ASIACCS). ACM, pp 1–14
Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Advances in cryptology EUROCRYPT. Springer, pp 568–588
Difo M (2012) Diffie-Hellman and its application security policies, IJESIT
Neha J, Brajesh P (2012) Forward secrecy for Google HTTPS using elliptic curve Diffie-Hellman key exchange algorithm. Int J Adv Res Comput Eng Technol (IJARCET) 1(9) November 2012
Ciphertext-policy attribute-based encryption: an expressive, E_cient, and provably secure realization: Brent Waters: University of Texas at Austin
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chennam, K.K., Muddana, A.L., Munnavara, T. (2018). Security in CryptDB Using Fine-Grained Access Controls with ECDHE-ZeroVi’s Framework. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_16
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)