Um sistema de processamento escalável de consultas analíticas sobre data warehouses criptografados e armazenados na nuvem

Autores

  • Claudivan Cruz Lopes Instituto Federal de Educação, Ciência e Tecnologia da Paraíba (IFPB), Campus Patos
  • Valéria Cesário Times Universidade Federal de Pernambuco (UFPE) http://orcid.org/0000-0002-0398-6173

DOI:

https://doi.org/10.18265/1517-03062015v1n35p22-33

Palavras-chave:

Data Warehouses Criptografados, Computação em Nuvem, Arquiteturas de Sistemas

Resumo

Sistemas de processamento de consultas para bancos de dados criptografados têm sido propostos como uma solução para proteger a confidencialidade de dados armazenados em servidores não confiáveis, tais como provedores de computação em nuvem, e para reduzir o impacto da criptografia no desempenho de consultas sobre dados criptografados. Pouca atenção, no entanto, tem sido dedicada em determinar como a escalabilidade provida pela computação em nuvem pode ser usada para melhorar o desempenho de consultas analíticas sobre Data Warehouses (DW) criptografados. Nesse sentido, este artigo descreve um sistema de processamento escalável de consultas analíticas sobre DW criptografados armazenados na nuvem, em que são especificados os componentes arquiteturais que dão suporte a esta escalabilidade.

Downloads

Não há dados estatísticos.

Referências

ABADI, D. J. Data Management in the Cloud: Limitations and Opportunities. IEEE Data Engineering Bulletin. Washington, v. 21, n. 1, p. 3–12, 2009.

BABY, T.; CHERUKURI, A. K. On Query Execution Over Encrypted Data. Security and Communication Networks, New York, v. 8, p. 321-331, 2015.

BADGER, M. L. et al. Cloud Computing Synopsis and Recommendations. National Institute of Standards and Technology, 2012. Disponível em: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911075. Acesso em: 10 jun. 2015.

CHUNG, S. S.; OZSOYOGLU, G. Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. In: INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS, 22., Atlanta. Proceedings... Atlanta: ICDEW, 2006, p. 98-106.

CODD, E. F.; CODD, B. S.; SALLEY, C. T. Providing OLAP (Online Analytical Processing) to User-Analysts: An IT Mandate. 1. ed. Codd & Associates, 1993.

GOSAIN, A.; ARORA, A. Security Issues in Data Warehouse: A Systematic Review. Procedia Computer Science, Atlanta, v. 48, p. 149–157, 2015.

HACIGUMUS, H. et al. Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 22., Madison. Proceedings... Madison: SIGMOD, 2002, p. 216-227.

HACIGUMUS, H.; IYER, B.; MEHROTRA, S. Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: INTERNATIONAL CONFERENCE ON DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 9., Jeju Island. Proceedings... Jeju Island: DASFAA, 2004, p. 125-136.

HORE, B. et al. Secure Multidimensional Range Queries over Outsourced Data. The VLDB Journal, Secaucus, v. 21, n. 3, p. 333–358, 2012.

INMON, W. H. Building the Data Warehouse. 4. ed. New York: Wiley, 2005.

KADHEM, H.; AMAGASA, T.; KITAGAMA, H. A Novel Framework for Database Security based on Mixed Cryptography. In: INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES, 4., Venice. Proceedings... Venice: ICIW, 2009, p. 163-170.

KADHEM, H.; AMAGASA, T.; KITAGAMA, H. Optimization Techniques for Range Queries in the Multivalued-Partial Order Preserving Encryption Scheme. In: FRED, A.; DIETZ, J. L. G.; LIU, K.; FILIPE, J. (Org.). Knowledge Discovery, Knowledge Engineering and Knowledge Management, Springer Berlin Heidelberg, 2013, v. 272, p. 338-353.

KIM, J. et al. On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 5., Maiori. Proceedings... Maiori: SCN, 2006, p. 242-256.

KIMBALL, R.; ROSS, M. The Data Warehouse Toolkit. 3. ed. New York: Wiley, 2013.

KOUNS, J.; MARTIN, B. DataLossDB: Open Security Foundation. OSF DataLossDB, 2015. Disponível em: <http://www.datalossdb.org>. Acesso em: 10 jun. 2015.

LIU, D. Securing Outsourced Databases in the Cloud. In: NEPAL, S.; PATHAN, M. (Org.). Security, Privacy and Trust in Cloud Systems. Springer Berlin Heidelberg, 2014, p. 259-282.

LOPES, C. C.; TIMES, V. C. A Framework for Investigating the Performance of Sum Aggregations over Encrypted Data Warehouses. In: ACM SYMPOSIUM ON APPLIED COMPUTING, 30., Salamanca. Proceedings... Salamanca: ACMSAC, 2015, p. 1000-1007.

LOPES, C. C. et al. Processing OLAP Queries over an Encrypted Data Warehouse Stored in the Cloud. In: International Conference on Data Warehousing and Knowledge Discovery, 16., Munique. Proceedings... Munique:DaWaK, 2014, p. 195-207.

MELL, P.; GRANCE, T. The NIST Definition of Cloud Computing. National Institute of Standards and Technology, 2011. Disponível em: <http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909616>. Acesso em: 10 jun. 2015.

POPA, R A. Building Practical Systems That Compute on Encrypted Data. 154 f. 2014. Thesis (Doctoral Degree of Philosophy)–Department of Electrical Engineering and Computer Science, MIT, Massachusetts, 2014.

POPA, R. A.; LI, F. H.; ZELDOVICH, N. An Ideal-Security Protocol for Order-Preserving Encoding. In: IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2013., San Francisco. Proceedings... San Francisco: SSP, 2013, p. 463-477.

POPA, R. A. et al. CryptDB: Processing Queries on an Encrypted Database. Communications of the ACM, New York, v. 55, n. 9, p. 103-111, 2012.

SRINIVASAMURTHY, S. et al. Security and Privacy in Cloud Computing: A Survey. Parallel & Cloud Computing, New York, v. 2, n. 4, p. 126-149, 2013.

SANTOS, R. J.; BERNARDINO, J.; VIEIRA, M. A Survey on Data Security in Data Warehousing: Issues, Challenges and Opportunities. In: INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, 2011, Lisboa. Proceedings... Lisboa: EUROCON, 2011, p. 1-4.

SANTOS, R. J. et al. A Specific Encryption Solution for Data Warehouses. In: MENG, W.; FENG, L.; BRESSAN, S.; WINIWARTER, W.; SONG, W. (Org.). Database Systems for Advanced Applications, Springer Berlin Heidelberg, v. 7826, p. 84-98, 2013.

SMITH, K. et al. Making Query Execution Over Encrypted Data Practical. In: JAJODIA, S.; KANT, K.; SAMARATI, P.; SINGHAL, A.; SWARUP, V.; WANG, C. (Org.). Secure Cloud Computing. Springer New York, 2014, p. 171-188.

SCHNEIER, B. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In: ANDERSON, S. (Org.). Fast Software Encryption. Springer Berlin Heidelberg, 1994, p. 191-204.

SOUSA, F. R. C.; MOREIRA, L. O.; MACHADO, J. C. Computação em Nuvem: Conceitos, Tecnologias, Aplicações e Desafios. In: ESCOLA REGIONAL DE COMPUTAÇÃO CEARÁ, MARANHÃO E PIAUÍ, 3., Anais... ERCEMAPI, 2009, p. 150-175.

THOMPSON, B. et al. Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. In: PRIVACY ENHANCING TECHNOLOGIES SYMPOSIUM, 9., Seattle. Proceedings... Seattle:PETS, 2009, p. 185-201.

TU, S. et al. Processing Analytical Queries over Encrypted Data. In: INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, 39., Trento. Proceedings... Trento: VLDB, 2013, p. 289-300.

WU, Z. et al. Executing SQL Queries over Encrypted Character Strings in the Database-As-Service Model. Knowledge-Based Systems, Amsterdam, v. 35, p. 332-348, 2012.

Downloads

Publicado

2017-06-27

Edição

Seção

Ciência da Computação