Skip to main content

Security in CryptDB Using Fine-Grained Access Controls with ECDHE-ZeroVi’s Framework

  • Conference paper
  • First Online:
  • 1517 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

Cloud Computing is a vast technology with high economic benefits, with low cost, many industries planning to store their information on cloud maintained by a third party are Third-Party Storage provider (TSP). Sometimes curious or malicious administrators may leak data in the TSP. CryptDB provides confidentiality works by executing the user SQL queries about encrypted data using Onion Encryption. Another threat is from cloud users, where they try to secure the systems against external adversaries with a secured user login and secure end-to-end encrypted connections. Though, the internal adversaries remain also the biggest threat from this case. The proposed security method of applying Elliptic Curve Diffie–Hellman Ephemeral in CP-ABE (Cipher Text Attribute-Based Encryption) technique for Key Exchange Policy. CP-ABE is a fine-grained access control with the policy of Attribute Authority (AA) to a user is having Secret Key (SK) based on the set of character attributes. Elliptic Curve Diffie–Hellman Ephemeral is a well-known technique in key exchange policy. Combining CP-ABE with Elliptic Curve Diffie–Hellman Ephemeral is proposed for the ECDHE-ZeroVi’s framework.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (20111) Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the twenty-third ACM symposium on operating systems principles, SOSP 2011, ACM, New York, pp 85–100

    Google Scholar 

  2. Solomon MG, Sunderam V, Xiong L (2014) Towards secure cloud database with fine-grained access control. In: Department of Mathematics & Computer Science Emory University Atlanta, Georgia 30322, USA

    Google Scholar 

  3. Bethencourt J, Sahai A, Waters B (2007) Cipher text-policy attribute-based encryption. In: IEEE symposium on security and privacy, IEEE Computer Society, pp 321–334

    Google Scholar 

  4. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) CRYPTO 2001, vol 2139. LNCS. Springer, Heidelberg, pp 213–229

    Chapter  Google Scholar 

  5. Fiat A, Naor M (1994) Broadcast encryption. In: Stinson DR (ed) CRYPTO 1993, LNCS, vol 773, Springer, Heidelberg, pp 480–491

    Google Scholar 

  6. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, ACM, New York, pp 89–98

    Google Scholar 

  7. Kim J, Susilo W, Au MH, Seberry J (2014) Efficient semi-static secure broadcast encryption scheme. In: Cao Z, Zhang F (eds) Pairing 2013, vol 8365. LNCS. Springer, Heidelberg, pp 62–76

    Google Scholar 

  8. Phan D-H, Pointcheval D, Shahandashti SF, Strefler M (2013) Adaptive cca broadcast encryption with constant-size secret keys and ciphertexts. Int J Inf Secur 12(4):251–265

    Article  Google Scholar 

  9. Armbrust M et al (2009) Above the clouds: a berkeley view of cloud computing [Technical report]. EECS Department, University of California, Berkeley

    Google Scholar 

  10. Arrington M (2006) Gmail disaster: reports of mass email deletions.http://www.techcrunch.com/2006/12/28/gmail-disasterreports-ofmassemail-deletions

  11. Erway C et al (2009) Dynamic provable data possession. In: Proceedings of the 16th ACM conference on computer and communications security (CCS). ACM, pp 213–222

    Google Scholar 

  12. Boneh D et al (2005) Hierarchical identity based encryption with constant size cipher text. In: Advances in cryptology eEUROCRYPT, Springer

    Google Scholar 

  13. Ostrovsky R (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security (CCS), pp 195–203

    Google Scholar 

  14. Samarati P, De Capitani di Vimercati S (2010) Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on information, computer and communications security (ASIACCS). ACM, pp 1–14

    Google Scholar 

  15. Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Advances in cryptology EUROCRYPT. Springer, pp 568–588

    Chapter  Google Scholar 

  16. Difo M (2012) Diffie-Hellman and its application security policies, IJESIT

    Google Scholar 

  17. Neha J, Brajesh P (2012) Forward secrecy for Google HTTPS using elliptic curve Diffie-Hellman key exchange algorithm. Int J Adv Res Comput Eng Technol (IJARCET) 1(9) November 2012

    Google Scholar 

  18. Ciphertext-policy attribute-based encryption: an expressive, E_cient, and provably secure realization: Brent Waters: University of Texas at Austin

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Krishna Keerthi Chennam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chennam, K.K., Muddana, A.L., Munnavara, T. (2018). Security in CryptDB Using Fine-Grained Access Controls with ECDHE-ZeroVi’s Framework. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics