NOVEL TECHNIQUE FOR SECURE IN OUTSOURCING OF DATA BASE
Authors: Islam Patel , Sunil Patel
Certificate: View Certificate
Abstract
Several of the for the most part difficult in data outsourcing situation are the enforcement of authorization policies and the sustain of policy updates. In this paper, we proposed a cryptographic technique to put into effect a fine-grained access control on the outsourced data, that is double encryption protocol exploit the collective features of the ciphertext policy attribute-based encryption and collection key management algorithm. The proposed scheme permits a data owner to describe the access control policy and put into effect it on his outsourced data. It moreover features a method that enables added finegrained access control with proficient attribute and customer revocation ability. We established that the proposed scheme is proficient and scalable to securely supervise the outsourced data. Keywords : Outsourcing , double encryption protocol , Preserve Privacy.
Introduction
although approximately a decade of research on secure data outsourcing, accessible approaches have not been reported to have much accomplishment in process due to: initially, they conquer security challenge with rigid limitations on data types or query support, every now and then with significant overheads, and secondly, they gratify dissimilar necessities such as accuracy and privacy based on dissimilar or even opposing assumption. The potentially explosive enlargement of database outsourcing is disadvantaged by security concern: privacy and integrity. though privacy in outsourced databases has been at length researched, there still does not exist a practical system that can give complete integrity guarantees before this work. The proposed approach uses a modified row-based encryption technique for better access control and security. It also uses client side memory and selective encryption to increase performance of the system. Selective encryption allows triggers and stored procedures to execute on the database, which s one of the major issue with row-based encryption. The proposed scheme is simple, secure and less time consuming in comparison to over encryption technique, or the one in which complete database is encrypted using a single key. It is flexible in terms of encryption technique for row-based encryption. In the proposed scheme, AES algorithm is used which is better than its counterparts in terms performance and strength.
Conclusion
The proposed technique is helpful for establishing integrity and confidentiality of the data while accessing outsourced databases. The proposed scheme provides strong authentication as it uses row-based encryption and a token based mechanism. It uses selective encryption mechanism which eliminates performance issues related to row-based encryption. Use of AES makes it more efficient and applicable. Future Direction of work As future work or proposal for researchers concerned in the topic, we visualize two ways of improving this increasing the excellence of the search appearance by using the same keywords we establish:Focus on privacy: as we have give details, confidentiality observe to the protection of data and anticipation of leakages. The majority applicable keywords that match this explanation are confidentiality, attack detection, recuperation (of data loss), fortification, data, and access control. Combination these keywords in a apposite search expression capacity give appropriate consequences which might give extra insight on issue we review like virtualization, access control and encryption, technique that aim at provided that data protection in Cloud Computing.
Copyright
Copyright © 2025 Islam Patel , Sunil Patel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.