Please use this identifier to cite or link to this item:
https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3221
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.thesis.supervisor | Ranasinghe, D.N. (Dr.) | - |
dc.contributor.author | Nissanka, L.N.A.S.C. | - |
dc.date.accessioned | 2015-07-07T03:44:25Z | - |
dc.date.available | 2015-07-07T03:44:25Z | - |
dc.date.issued | 2015-07-07 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/3221 | - |
dc.description.abstract | Performingvariousmathematicaloperations,searchingandsortingonacloudenvi- ronmentaresecurityconcerns.Sincetheuserspaceissharedtherearequestionsabout con dentialityofthedata.Byperformingoperationsonencrypteddata,con dentiality can beachievedwhiletheyarebeingprocessed.Thiscanbedoneusinghomomorphic encryption. Alsoorderpreservingencryptionschemescanbeusedtoprovidesearching and sortingfortheencrypteddata. When relatedworkisconsidered,someoftheimplementationslikecipherbaseand trustdb requirespecialhardwaresetup,somearehighlycomplexandimplementations likecryptdbrequiresmallchangestothedatabasecoreaswell.Thusnonecanbeused in acloudenvironmentunlesstheenvironmentbelongstothesamepersonorcompany. This endeavoristoprovideanopensourceimplementationthatworksinlooselycoupled manner toprovideabovecapabilitiesfordatastoredinCassandra. As anoutcomeoftheresearchanopensourcelibraryisimplementedwithhomomor- phic encryptioncapabilitieswhichcanperformmathematicaloperationsandsearchand sort onencrypteddata.Basicmathematicaloperationsaresupported(i.e.addition,sub- traction, multiplication,division)intheimplementationforintegers,realnumbersand negativevalues,usingPaillierandRSAciphers.Tomakethedataatrestsemantically secure asecondlayerofencryptionisadded.Anorderpreservingencryptionscheme called mOPEisusedtoprovidesearchingandsorting.Cassandraisusedasthedatabase to persistthedatasincelotofcloudserviceproviders'useitintheirinfrastructures. Based ontheevaluationtheimplementedlibraryperformsconsistentlyformathemat- ical operationsregardlessoftheplaintextsizeencrypted.Alsobasedonthenumberof operationstheforcipher-textaddition,thetimegrowsexponentially.Encryptionislinear and theperformanceisnotchangedbasedonthekeysizeofthecipher-text.Whenrecords with encryptedvaluesareinsertedintoCassandra,performancedroppedapproximately 8 times. As futureworkperformanceimprovementstotheimplementation,performingcomplex functions oncipher-text,completesearchingandsortingonencryptedtextcanbedone. Evaluationssuggestthateventhoughthisresearchisstillnotreadytobeintegrated with arealtimesystem,itcanbeusedinscenarioslikebatchprocessingordatamining independentlyoftheinfrastructureused. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Processing numerical data securely in NoSQL database backed shared user spaces | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Master of Science in Information Security - 2015 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2012MIS010.pdf Restricted Access | 2.95 MB | Adobe PDF | View/Open Request a copy |
Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.