Search In this Thesis
   Search In this Thesis  
العنوان
Confidentiality and Integrity of Query Results for Cloud Databases \
المؤلف
Rady, Mai Mustafa Adly.
هيئة الاعداد
باحث / مي مصطفى عدلي راضي
مشرف / رشا اسماعيل
مشرف / تامر مصطفى عبدالقادر
مناقش / ايمن محمد بهاء الدين
تاريخ النشر
2022.
عدد الصفحات
72 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Information Systems
تاريخ الإجازة
1/1/2022
مكان الإجازة
جامعة عين شمس - كلية الحاسبات والمعلومات - نظم المعلومات
الفهرس
Only 14 pages are availabe for public view

from 72

from 72

Abstract

The digital data amount is increasing at a phenomenal rate, outpacing the local storage ability of many organizations. Therefore, outsourcing data is considered a solution to store large data into efficient cloud servers. Cloud computing environment offers on demand access to several computing services providing benefits such as reduced maintenance, lower fundamental costs on different resources, global access, etc. Database as a Service (DBaaS) is one of its prominent services. Database Service Providers (DSPs) have the infrastructure to host outsourced databases at distributed servers and provide efficient facilities for their users to create, store, update and access databases anytime from any place through Internet. Outsourcing data into cloud servers have many features as flexibility, scalability and robustness, but in order to provide these, features as data confidentiality and data integrity are often sacrificed.
This thesis presents secure scheme to provide Confidentiality and Integrity of Query results for Cloud Databases (SCIQ-CD). The scheme architecture integrates different cryptographic techniques such as: AES, RSA, and SHA2 to achieve the data security properties. The scheme allows the data owner to outsource their database, which includes sensitive data to a DSP, and performs dynamic and static operations on the outsourced Database. In addition, the scheme uses trusted third-party server that serves as intermediate server between the DSP and users to check the data confidentiality and the data integrity. The security analysis demonstrates that our construction can achieve the desired security properties. The performance analysis shows that our proposed scheme is efficient for practical deployment, it imposes a small overhead for select, range, update and a reasonable overhead for insert and delete.