Modified Security Frame Work for PIR Cloud Computing Environment?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 4)
Publication Date: 2013-04-15
Authors : J. Sinduja S. Prathiba;
Page : 402-408
Keywords : Data Security; Cloud; Secret sharing; Information Dispersal;
Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. Our approach assumes a disk-based architecture that retrieves one page with a single query. Our results indicate that pCloud reduces considerably the query response time compared to the traditional client/server model, and has a very low communication overhead. Additionally, it scales well with an increasing number of peers; achieving a linear speedup Data outsourcing is a new paradigm in which a third party provides storage services. This is more cost effective for the user as there is no need of purchasing expensive hardware and software for data storage. Before data out sourcing can become viable, the data provider needs to guarantee that the data is secure, be able to execute queries on the data, and the results of the queries must also be secure and not visible to the data provider. Data encryption, Homomorphic Encryption, Secret Sharing algorithms and Private Information Retrieval (PIR) are the techniques widely used for secure data outsourcing. CIA (Confidentiality, Integrity and Availability) are the challenging issues associated with data storage management with/without data outsourcing. In this paper the performance of two secret sharing algorithms are compared. The Shamir’s secret sharing algorithm and Rabin’s Information Dispersal Algorithm (IDA) are implemented in a private cloud setup using the Open Stack Cloud framework.
Other Latest Articles
Last modified: 2013-05-02 16:44:02