Data confidentiality using fragmentation in cloud computing

Purpose - The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security along with performance issues by encryption usage of outsourced data are the main motivation points of this researc...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of pervasive computing and communications Vol. 9; no. 1; p. 37
Main Authors Hudic, Aleksandar, Islam, Shareeful, Kieseberg, Peter, Rennert, Sylvi, Weippl, Edgar R
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 01.01.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Purpose - The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security along with performance issues by encryption usage of outsourced data are the main motivation points of this research. Design/methodology/approach - This paper presents a method for secure and confidential storage of data in the cloud environment based on fragmentation. The method supports minimal encryption to minimize the computations overhead due to encryption. The proposed method uses normalization of relational databases, tables are categorized based on user requirements relating to performance, availability and serviceability, and exported to XML as fragments. After defining the fragments and assigning the appropriate confidentiality levels, the lowest number of Cloud Service Providers (CSPs) is used required to store all fragments that must remain unlinkable in separate locations. Findings - Particularly in the cloud databases are sometimes de-normalised (their normal form is decreased to lower level) to increase the performance. Originality/value - The paper proposes a methodology to minimize the need for encryption and instead focus on making data entities unlinkable so that even in the case of a security breach for one set of data, the privacy impact on the whole is limited. The paper would be relevant to those people whose main concern is to preserve data privacy in distributed systems.
ISSN:1742-7371
1742-738X
DOI:10.1108/17427371311315743