z-logo
open-access-imgOpen Access
Study of the problem of ensuring security in the storage and processing of confidential data
Author(s) -
Сергей Анатольевич Мартишин,
Марина Валерьевна Храпченко,
Александр Владимирович Шокуров
Publication year - 2021
Publication title -
trudy instituta sistemnogo programmirovaniâ ran/trudy instituta sistemnogo programmirovaniâ
Language(s) - English
Resource type - Journals
eISSN - 2220-6426
pISSN - 2079-8156
DOI - 10.15514/ispras-2021-33(2)-11
Subject(s) - computer science , cloud computing , encryption , computer security , confidentiality , database , sql , adversary , cloud database , client side encryption , information leakage , on the fly encryption , operating system
We introduce an overview of modern approaches to cloud confidential data processing. A significant part of data warehouse and data processing systems is based on cloud services. Users and organizations consider such services as a service provider. This approach allows users to take benefit from all of these technologies: they do not need to purchase, install and maintain expensive equipment, they can access the data and the calculation results from any device. Such data processing on cloud services carries certain risks because one of the participants of the protocol for securing access to cloud data storage may be an adversary. This leads to the threat of confidential information leakage. The above approaches are intended for databases in which information is stored in the encrypted form and they allow to work in the familiar paradigm of SQL queries. Despite the advantages such approach has some limitations. It is necessary to choose an encryption method and to maintain a balance between the reliability of encryption and the set of requests required by users. In the case if users are not limited by the framework of SQL queries, we propose another way of implementation of cloud computing over confidential data using free software. It is based on lambda architecture combined with certain restrictions on allowed deductively safe database queries.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here