A Secure Multi-User Database-as-a-Service Approach for ... › publication › fulltext › A-Secure-... › publication › fulltext › A-Secure-...by Y Gahi · 2019 · Cited by 1 · Related articlesNov 7, 2019 — Keywords: Database-as-a-Service; Data Retrival; Clou
ScienceDirect ScienceDirect
Procedia online Computer 00 (2019) 000–000 Available at Science www.sciencedirect.com Procedia Computer Science 00 (2019) 000–000
ScienceDirect
www.elsevier.com/locate/procedia www.elsevier.com/locate/procedia
Procedia Computer Science 160 (2019) 811–818
International Workshop on Emerging Networks and Communications (IWENC 2019) International Workshop on Emerging Networks and Communications (IWENC 2019) November 4-7, 2019, Coimbra, Portugal November 4-7, 2019, Coimbra, Portugal
A Secure Multi-User Database-as-a-Service Approach for Cloud A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy Computing Privacy Youssef Gahiaa* and Imane El Alaouibb Youssef Gahi * and Imane El Alaoui
a LGS, Laboratoire Génie des Systèmes, Ecole Nationale Sciences Appliquées, Université Ibn Tofail, Kénitra, Morocco a LASTID, Laboratoire des Systèmes de Télécommunications Ingénierie de la Décision, Université Ibn Tofail, Kénitra, Morocco LGS, Laboratoire Génie des Systèmes, Ecole NationaleetSciences Appliquées, Université Ibn Tofail, Kénitra, Morocco b LASTID, Laboratoire des Systèmes de Télécommunications et Ingénierie de la Décision, Université Ibn Tofail, Kénitra, Morocco b
Abstract Abstract Database-as-a-Service (DBaaS) is a new trend that allows industries and organizations outsource their databases and Database-as-a-Service is a newdespite trend the thatmany allows industries and organizations their computations to external(DBaaS) parties. However, advantages provided by this serviceoutsource in terms of costdatabases reduction and computations to external However, despite the many provided by this service has in terms cost reduction and efficiency, DBaaS raises parties. many security issues regarding dataadvantages privacy. The protection of privacy been of addressed by several research efficient solutions suchdata as privacy. encrypted and queries overaddressed encryptedbyrecords. efficiency,contributions DBaaS raisesproposing many security issues regarding Thedatabases protection of blind privacy has been several research contributions efficient solutions queries encrypted records. However, access controlproposing techniques still suffer from asuch lackasof encrypted efficiency databases especially and whenblind dealing with over encrypted databases. In However, still schemes suffer from a lack an of efficiency when dealing with owner) encrypted In this latter access context,control almosttechniques all proposed consider architectureespecially of a single user (the data thatdatabases. queries his encrypted that he all is the only one capableconsider of decrypting. From a practical perspective, database system set uphis to this latter database context, almost proposed schemes an architecture of a single user (thea data owner) that is queries encryptednotdatabase he user is thebut only one capable decrypting. Fromqueries. a practical perspective, a database system is set to up an to support only a that single multiple users of initiating multiple However, managing multiple accesses support notdatabase only a introduces single userseveral but multiple userslike initiating multiple However, managing multiple to we an encrypted challenges key sharing, keyqueries. revocation, and data re-encryption. In accesses this paper, propose andintroduces efficient proved thatlike allows to query theand same and decrypt thepaper, retrieved encrypteda simple database several protocol challenges key multiple sharing, users key revocation, datadatabase re-encryption. In this we proposewithout a simple and efficient protocol thatthis allows multiple usersowner to query therisking same database and decrypt results getting access toproved the secret key. In protocol, the data is not the data privacy sincethe he retrieved does not resultstowithout the secret key. In collaboration. this protocol, the data owner is not risking the data privacy since he does not need share thegetting secretaccess key to to enable a multi-party need to share the secret key to enable a multi-party collaboration. © 2019 The Authors. Published by Elsevier B.V. © 2019 2019 The Authors. Published by Elsevier Elsevier B.V. © The Authors. by This is an open accessPublished article under the CC B.V. BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/) This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/) This is an open access article under theConference CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/) Peer-review under responsibility of the Program Chairs. Peer-review under responsibility of the Conference Program Chairs. Peer-review under responsibility of the Conference Program Chairs.
Keywords: Database-as-a-Service; Data Retrival; Cloud Computing; Homomorphic Encryption Schemes; Bling Decryption; Multi-user Environmen Keywords: Database-as-a-Service; Data Retrival; Cloud Computing; Homomorphic Encryption Schemes; Bling Decryption; Multi-user Environmen
* Corresponding author. Tel.: +212-5-37-329-246; fax: +212