ABSTRACT

Introduction ........................................................................................................... 94 Challenges in Outsourcing Databases to the Cloud ........................................ 95 Key Management Role ......................................................................................... 96

Owner-Side Policy Enforcement Solutions................................................... 97 User-Side Policy Enforcement Solutions....................................................... 97 Shared Policy Enforcement Solutions ........................................................... 97

Contribution of This Work ................................................................................... 97 Owner-Side Policy Enforcement Solutions ....................................................... 97

NetDB2 ............................................................................................................... 98 Encryption Approaches .............................................................................. 98

Order-Preserving Encryption Scheme ...........................................................99 Assumptions ................................................................................................99 Proposed OPES ............................................................................................99 Overview of OPES ..................................................................................... 100 Three Stages of OPES ................................................................................ 100

User-Side Policy Enforcement Solutions ......................................................... 100 TUH (Tree Based on User Hierarchy)-Based Solution .............................. 101 Dife-Hellman-Based Key Generation Scheme ........................................ 102

Key Management Solution ....................................................................... 103 Trie-Based Approach ...................................................................................... 105

The Binary Trie-Building Algorithm ....................................................... 105 Client-and Server-Side Policy Enforcement Solutions ................................. 106

Overencryption ............................................................................................... 107 Cloud-Based Key Management ................................................................... 108

Joint Encryption Scheme .......................................................................... 108 Cloud-Based Key Management Protocol ............................................... 108

Summary .............................................................................................................. 109 Conclusion ........................................................................................................... 109 References ............................................................................................................. 111

In today’s scenario, efcient data processing is a fundamental and vital issue for almost every scientic, academic, or business organization. To tackle this issue, organizations end up installing and managing database systems to satisfy different processing needs. In case of adopting a traditional solution, the organization needs to purchase the necessary hardware, deploy database products, establish network connectivity, and hire professional people who run the system. But this solution is getting impractical and expensive as the database systems and problems become larger and complicated (El-Khoury et al., 2009). Again, traditional solution entails different costs from the perspective of the investments involved. These concerns are handled efciently to a great extent by the fast developing technology that goes by the name, “cloud computing.”